


default search action
CoRR, May 2014
- Moritz Kassner, William Patera, Andreas Bulling:
Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction. - Namyoon Lee, Robert W. Heath Jr.:
Space-Time Physical-Layer Network Coding. - Namyoon Lee, Ravi Tandon, Robert W. Heath Jr.:
Distributed Space-Time Interference Alignment. - Matthijs Vákár:
Syntax and Semantics of Linear Dependent Types. - Aaron Hunter:
Belief Revision and Trust. - T. El-Shishtawy:
A Mobile Management System for Reforming Subsidies Distribution in Developing Countries. - Zubair Nabi, Atif Alvi:
Clome: The Practical Implications of a Cloud-based Smart Home. - Paul F. Tupper:
Exemplar Dynamics Models of the Stability of Phonological Categories. - Giuseppe De Giacomo, Riccardo De Masellis, Marco Grasso, Fabrizio Maria Maggi, Marco Montali:
LTLf and LDLf Monitoring: A Technical Report. - Arseny M. Shur, Abuzer Yakaryilmaz:
Quantum, Stochastic, and Pseudo Stochastic Languages with Few States. - Haoyu Song, Jun Gong, Hongfei Chen, Justin Dustzadeh:
Unified POF Programming for Diversified SDN Data Plane. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:
Information Flow Decomposition in Feedback Systems: Linear Time-Invariant Systems with Gaussian Channels. - Mahmoud Khademi, Louis-Philippe Morency:
Relative Facial Action Unit Detection. - Hoda Daou, Fabrice Labeau:
Medically Relevant Criteria used in EEG Compression for Improved Post-Compression Seizure Detection. - Hovhannes Tananyan:
Domination games played on line graphs of complete multipartite graphs. - C. Venkatesh, D. Nagaraju, T. Sunil Kumar Reddy:
Binary Protector: Intrusion Detection in Multitier Web Applications. - Antonios Michaloliakos, Ryan Rogalin, Yonglong Zhang, Konstantinos Psounis, Giuseppe Caire:
Performance Modeling of Next-Generation Wireless Networks. - Rajesh Hemant Chitnis, Graham Cormode, Mohammad Taghi Hajiaghayi, Morteza Monemizadeh:
Parameterized Streaming Algorithms for Vertex Cover. - Ms. Rajni, Ms. Reena:
Review of MANETS Using Distributed Public-key Cryptography. - Manju Kaushik, Rashmi Jain:
Natural User Interfaces: Trend in Virtual Interaction. - Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön:
Capacity estimation of two-dimensional channels using Sequential Monte Carlo. - Noémi Gaskó, Rodica Ioana Lung, D. Dumitrescu:
Computing Strong Nash Equilibria for Multiplayer Games. - Vaibhav Jha, Mohit Jha, G. K. Sharma:
Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip. - Phil Maguire, Philippe Moser, Rebecca Maguire, Virgil Griffith:
Is Consciousness Computable? Quantifying Integrated Information Using Algorithmic Information Theory. - Binbin Lin, Ji Yang, Xiaofei He, Jieping Ye:
Geodesic Distance Function Learning via Heat Flow on Vector Fields. - Kais Dukes:
Contextual Semantic Parsing using Crowdsourced Spatial Descriptions. - Ryutaroh Matsumoto:
Coding Theoretic Construction of Quantum Ramp Secret Sharing. - Anthony Bonato, David F. Gleich, Myunghwan Kim, Dieter Mitsche, Pawel Pralat, Amanda Tian, Stephen J. Young:
Dimensionality of social networks using motifs and eigenvalues. - Pierre de Buyl, Nelle Varoquaux:
Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013). - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:
Un algorithme de test pour la connexité temporelle des graphes dynamiques de faible densité. - Karim M. Mohamed, Mohamed A. Ismail, Nagia M. Ghanem:
VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering. - Amihood Amir, Timothy M. Chan, Moshe Lewenstein, Noa Lewenstein:
On Hardness of Jumbled Indexing. - Klesti Hoxha, Alda Kika, Eriglen Gani, Silvana Greca
:
Towards a Modular Recommender System for Research Papers written in Albanian. - Navya Chodisetti:
Analysis of Digital Knapsack Based Sealed Bid Auction. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Binary Fading Interference Channel with No CSIT. - Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. - Sreejith T. Veetil, Kiran Kuchi, Radha Krishna Ganti:
Performance of PZF and MMSE Receivers in Cellular Networks with Multi-User Spatial Multiplexing. - Greg Castañón, Mohamed A. Elgharib, Venkatesh Saligrama, Pierre-Marc Jodoin:
Retrieval in Long Surveillance Videos using User Described Motion and Object Attributes. - Joe-Mei Feng, Felix Krahmer:
An RIP-based approach to $ΣΔ$ quantization for compressed sensing. - Federica Panella:
Approximate Query Answering in Inconsistent Databases. - James Whitacre, Sven Schellenberg, Antony Iorio:
Coal Blending: Business Value, Analysis, and Optimization. - Cláudia Nalon, João Marcos, Clare Dixon:
Clausal Resolution for Modal Logics of Confluence. - Alireza Goudarzi, Matthew R. Lakin, Darko Stefanovic:
Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks. - Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, C. Lawrence Zitnick:
Microsoft COCO: Common Objects in Context. - Anirban Bhattacharyya, Andrey Mokhov, Ken G. Pierce, Manuel Mazzara:
On Formalisms for Dynamic Reconfiguration of Dependable Systems. - Danko Adrovic, Jan Verschelde:
Computing all Affine Solution Sets of Binomial Systems. - Leonardo Aniello, Andrea Bondavalli, Andrea Ceccarelli, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Antonella Guzzo, Antonio Pecchia, Andrea Pugliese, Leonardo Querzoni, Stefano Russo:
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities. - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. - Yixin Cao, Luciano N. Grippo, Martín Darío Safe:
Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection. - Uzay Çetin, Haluk O. Bingol:
Iterated Prisoners Dilemma with limited attention. - Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. - Umang Vipul:
Map-Reduce Parallelization of Motif Discovery. - Noémi Gaskó, Mihai Suciu, Rodica Ioana Lung, D. Dumitrescu:
Characterization and Detection of epsilon-Berge Zhukovskii Equilibria. - Meik Dörpinghaus, Günther Koliander, Giuseppe Durisi, Erwin Riegler, Heinrich Meyr:
Oversampling Increases the Pre-Log of Noncoherent Fading Channels. - Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Fatal Attractors in Parity Games: Building Blocks for Partial Solvers. - Mansoor Ebrahim, Shujaat Khan, UmerBin Khalid:
Symmetric Algorithm Survey: A Comparative Analysis. - Mansoor Ebrahim, Shujaat Khan, Syed Sheraz Ul Hasan Mohani:
Peer-to-Peer Network Simulators: an Analytical Review. - Sylwia Polberg:
Extension-based Semantics of Abstract Dialectical Frameworks. - Fábio M. Bayer, Renato J. Cintra, Arjuna Madanayake
, Uma Sadhvi Potluri:
Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding. - Thomas Janson, Christian Schindelhauer:
Ad-Hoc Network Unicast in Time O(log log n) using Beamforming. - Sachin Lakra, T. V. Prasad, G. Ramakrishna:
Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net. - Rodica Bozianu, Catalin Dima, Emmanuel Filiot:
Safraless Synthesis for Epistemic Temporal Specifications. - Shao-Meng Qin, Hai-Jun Zhou:
Solving the undirected feedback vertex set problem by local search. - Fabrizio Grandoni, Tomasz Kociumaka, Michal Wlodarczyk:
An LP-Rounding $2\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph. - Ambedkar Dukkipati, Nithish Pai, Maria Francis, Abhishek Dubey:
Macaulay-Buchberger Basis Theorem for Residue Class Rings with Torsion and Border Bases over Rings. - Mehryar Mohri, Michael D. Riley:
On the Disambiguation of Weighted Automata. - Mathias Niepert, Pedro M. Domingos:
Exchangeable Variable Models. - Ines Marusic, James Worrell:
Complexity of Equivalence and Learning for Multiplicity Tree Automata. - Sina Lashgari, Amir Salman Avestimehr:
Blind Wiretap Channel with Delayed CSIT. - Aviad Rubinstein:
Computational Complexity of Approximate Nash Equilibrium in Large Games. - Moya Chen, Doris Xin, Damien Woods:
Parallel computation using active self-assembly. - Nicolas T. Courtois:
On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies. - Radoslaw Michalski, Tomasz Kajdanowicz, Piotr Bródka, Przemyslaw Kazienko:
Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach. - Edward Hermann Haeusler:
How many times do we need and assumption ? - Sergei Gepshtein, Ivan Tyukin:
Optimal measurement of visual motion across spatial and temporal scales. - Antti Puurula, Jesse Read, Albert Bifet:
Kaggle LSHTC4 Winning Solution. - Omar S. Soliman, Eman AboElHamd:
Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine. - Jun Pang, Yang Liu:
Proceedings Third International Workshop on Engineering Safety and Security Systems, ESSS 2014, Singapore, Singapore, 13 May 2014. EPTCS 150, 2014 [contents] - Vladimir V. Rybakov:
A Note on Parameterised Knowledge Operations in Temporal Logic. - Vidit Sharma, Ashish Garg:
Numerical Investigation of Effects of Compound Angle and Length to Diameter Ratio on Adiabatic Film Cooling Effectiveness. - Ryoma Sin'ya, Kiminori Matsuzaki, Masataka Sassa:
Simultaneous Finite Automata: An Efficient Data-Parallel Model for Regular Expression Matching. - Lucas Antiqueira, Liang Zhao:
Spatial Neural Networks and their Functional Samples: Similarities and Differences. - Prabhjot Kaur:
Web Content Classification: A Survey. - (Withdrawn) On Lipschitz Continuity and Smoothness of Loss Functions in Learning to Rank.
- Sougata Chaudhuri, Ambuj Tewari:
Perceptron-like Algorithms and Generalization Bounds for Learning to Rank. - (Withdrawn) On the Construction of Maximum-Quality Aggregation Trees in Deadline-Constrained WSNs.
- Xuehan Xiong, Fernando De la Torre:
Supervised Descent Method for Solving Nonlinear Least Squares Problems in Computer Vision. - Aibek Makazhanov, Denilson Barbosa, Grzegorz Kondrak:
Extracting Family Relationship Networks from Novels. - James Brofos, Ajay Kannan, Rui Shu:
Automated Attribution and Intertextual Analysis. - Bin Li, Ruogu Li, Atilla Eryilmaz:
Throughput-Optimal Scheduling Design with Regular Service Guarantees in Wireless Networks. - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, Patrick Totzke:
Infinite-State Energy Games. - Vimalkumar Jeyakumar, Abdul Kabbani, Jeffrey C. Mogul, Amin Vahdat:
Flexible Network Bandwidth and Latency Provisioning in the Datacenter. - Mario Mastriani:
Rule of Three for Superresolution of Still Images with Applications to Compression and Denoising. - Michael F. Nowlan, Jose M. Faleiro, Bryan Ford:
Crux: Locality-Preserving Distributed Systems. - Xiaojun Wan:
x-index: a fantastic new indicator for quantifying a scientist's scientific impact. - Djamal Ziani:
Feature Selection On Boolean Symbolic Objects. - Djamal Ziani:
Configuration in ERP SaaS Multi-Tenancy. - Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security. - Rajet Krishnan, Mohammad Reza Khanzadi, N. Krishnan, Alexandre Graell i Amat, Thomas Eriksson, Nicolò Mazzali, Giulio Colavolpe:
On the Impact of Oscillator Phase Noise on the Uplink Performance in a Massive MIMO-OFDM System. - Mohammadreza Malek-Mohammadi, Magnus Jansson, Arash Owrang, Ali Koochakzadeh, Massoud Babaie-Zadeh:
DOA Estimation in Partially Correlated Noise Using Low-Rank/Sparse Matrix Decomposition. - Manaal Faruqui:
"Translation can't change a name": Using Multilingual Data for Named Entity Recognition. - Bo Cheng, Ling Cheng:
Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity. - Kangqi Liu, Meixia Tao:
Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels. - Matthias Nickles, Alessandra Mileo:
Probabilistic Inductive Logic Programming Based on Answer Set Programming. - Hua Sun, Sundar R. Krishnamurthy, Syed Ali Jafar:
Rank Matching for Multihop Multiflow. - Euiwoong Lee:
Hardness of Graph Pricing through Generalized Max-Dicut. - Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Brief History of Web Crawlers. - Paul Accisano, Alper Üngör:
Finding a Curve in a Point Set. - Yonghong Yu, Can Wang, Yang Gao:
Attributes Coupling based Item Enhanced Matrix Factorization Technique for Recommender Systems. - Peng He, Bing Li, Deguang Zhang, Yutao Ma:
Simplification of Training Data for Cross-Project Defect Prediction. - Jingbo Liu, Emmanuel Abbe:
Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. - John C. Duchi, Michael I. Jordan, Martin J. Wainwright, Yuchen Zhang:
Information-theoretic lower bounds for distributed statistical estimation with communication constraints. - Vishal Anand, Ramani S:
Fault Localization in a Software Project using Back-Tracking Principles of Matrix Dependency. - Tarushi Sharma, AmanPreet Kaur:
Analysis of Email Fraud detection using WEKA Tool. - Martin Skutella:
A note on the ring loading problem. - Hasan Abasi, Nader H. Bshouty, Hanna Mazzawi:
On Exact Learning Monotone DNF from Membership Queries. - Valmi Dufour-Lussier, Alice Hermann, Florence Le Ber, Jean Lieber:
Belief revision in the propositional closure of a qualitative algebra (extended version). - Hannes Strass:
On the Relative Expressiveness of Argumentation Frameworks, Normal Logic Programs and Abstract Dialectical Frameworks. - Xianrui Li, D. B. Pei, Q. Liu, Rui Shen:
Design of a capacitor-less low-dropout voltage regulator. - Jianmin Ji, Hannes Strass:
Implementing Default and Autoepistemic Logics via the Logic of GK. - P. Sakthivel, P. Krishna Sankar:
Multi-Path Routing and Wavelength Assignment (RWA) Algorithm for WDM Based Optical Networks. - Sascha Kurz:
Ready for the design of voting rules? - Serguei Kaniovski, Sascha Kurz:
The average representation - a cornucopia of power indices? - Alexander Zimin, Rasmus Ibsen-Jensen, Krishnendu Chatterjee:
Generalized Risk-Aversion in Stochastic Multi-Armed Bandits. - Krishnendu Chatterjee, Martin Chmelik, Przemyslaw Daca:
CEGAR for Qualitative Analysis of Probabilistic Systems. - Marcin Wrochna:
Reconfiguration in bounded bandwidth and treedepth. - Sergey Goncharov, Lutz Schröder, Christoph Rauch:
(Co-)Algebraic Foundations for Effect Handling and Iteration. - Florian Kammueller:
Confinement for Active Objects. - Zhana Bao:
Finding Inner Outliers in High Dimensional Space. - Zhana Bao:
Robust Subspace Outlier Detection in High Dimensional Space. - Marco Maratea, Luca Pulina, Francesco Ricca:
The Multi-engine ASP Solver ME-ASP: Progress Report. - Simon Kramer:
A Galois-Connection between Cattell's and Szondi's Personality Profiles. - Grzegorz Orynczak, Marcin Jakubek, Karol Wawrzyniak, Michal Klos:
Market Coupling as the Universal Algorithm to Assess Zonal Divisions. - Yanina Shkel, Vincent Y. F. Tan, Stark C. Draper:
Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs. - John S. H. Baxter
, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to Multi-Labeling Problems under Arbitrary Region Regularization. - Xu Chen, Dongning Guo:
Many-Access Channels: The Gaussian Case with Random User Activities. - Talha Cihad Gülcü, Alexander Barg:
Interactive Function Computation via Polar Coding. - Matthias Henze, Rafel Jaume:
Bottleneck Partial-Matching Voronoi Diagrams. - Michelle Krüger Silvéria:
Virtual Windshields: Merging Reality and Digital Content to Improve the Driving Experience. - Hayder Raheem Hashim
:
The Discrete Logarithm problem in the ElGamal cryptosystem over the abelian group U(n) Where n= p^m, or 2p^m. - Riccardo Zese:
Reasoning with Probabilistic Logics. - Chandranath Adak:
Gabor Filter and Rough Clustering Based Edge Detection. - Fabio L. Traversa, Massimiliano Di Ventra:
Universal Memcomputing Machines. - Mario Mastriani:
Lossless compression catalyst based on binary allocation via modular arithmetic. - Mohit Jha, Shailja Shukla:
Design Of Fuzzy Logic Traffic Controller For Isolated Intersections With Emergency Vehicle Priority System Using MATLAB Simulation. - Elena Cabrio, Serena Villata:
Towards a Benchmark of Natural Language Arguments. - Joseph Cheriyan, Zhihan Gao, Konstantinos Georgiou, Sahil Singla:
On Integrality Ratios for Asymmetric TSP in the Sherali-Adams Hierarchy. - Tomás Kociský, Karl Moritz Hermann, Phil Blunsom:
Learning Bilingual Word Representations by Marginalizing Alignments. - Ulrike Barthelmess, Ulrich Furbach:
Do we need Asimov's Laws? - (Withdrawn) Verifiable Privacy-Preserving Member and Order Queries on a List.
- Tsung-Yi Chen, Xu Chen, Dongning Guo:
Many-Broadcast Channels: Definition and Capacity in the Degraded Case. - Shiqi Zhang, Mohan Sridharan, Michael Gelfond, Jeremy L. Wyatt:
KR$^3$: An Architecture for Knowledge Representation and Reasoning in Robotics. - Glencora Borradaile, Theresa Migler, Gordon T. Wilfong:
Density decompositions of networks. - Mohammad Rastegari, Shobeir Fakhraei, Jonghyun Choi, David W. Jacobs, Larry S. Davis:
Comparing apples to apples in the evaluation of binary coding methods. - Mate Boban:
Realistic and Efficient Channel Modeling for Vehicular Networks. - V. C. K. P. Arul Oli, Elayaraja Ponram:
Wireless Fidelity Real Time Security System. - Siddhartha Mukherjee:
Study on performance improvement of oil paint image filter algorithm using parallel pattern library. - Zhana Bao:
K-NS: Section-Based Outlier Detection in High Dimensional Space. - Elisa Gorla, Maike Massierer:
Index Calculus in the Trace Zero Variety. - Hien Quoc Ngo, Himal A. Suraweera, Michail Matthaiou
, Erik G. Larsson:
Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing. - Jean-François Baget, Fabien Garreau, Marie-Laure Mugnier, Swan Rocher:
Revisiting Chase Termination for Existential Rules and their Extension to Nonmonotonic Negation. - Narada Wickramage:
Rapture in the Cartesian Wall between Real World Entities and their Abstract Models. - David T. H. Kao, Amir Salman Avestimehr:
Linear Degrees of Freedom of the MIMO X-Channel with Delayed CSIT. - Joel A. Tropp:
Convex recovery of a structured signal from independent random linear measurements. - Szabolcs Iván:
On state complexity of unions of binary factor-free languages. - Étienne André
, Mohamed Mahdi Benmoussa, Christine Choppy:
Translating UML State Machines to Coloured Petri Nets Using Acceleo: A Report. 1-7 - Julien Brunel, Laurent Rioux, Stéphane Paul, Anthony Faucogney, Frédérique Vallée:
Formal Safety and Security Assessment of an Avionic Architecture with Alloy. 8-19 - Cornelius Diekmann
, Lars Hupel
, Georg Carle:
Directed Security Policies: A Stateful Network Implementation. 20-34 - Gurvan Le Guernic:
In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft. 50-55 - David Hauzar, Jan Kofron
, Pavel Bastecký:
Data-flow Analysis of Programs with Associative Arrays. 56-70 - Alex Dytso, Daniela Tuninetti, Natasha Devroye:
On the Two-user Interference Channel with Partial Codebook Knowledge at one Receiver. - Yishi Zhang, Chao Yang, Chan Xiong, Xingchi Zhou, Zigang Zhang:
Feature selection for classification with class-separability strategy and data envelopment analysis. - Marcello Balduccini, William C. Regli, Duc N. Nguyen:
An ASP-Based Architecture for Autonomous UAVs in Dynamic Environments: Progress Report. - Wanchun Jiang, Fengyuan Ren, Xin Yue, Chuang Lin:
Scale Congestion Control to Ultra-High Speed Ethernet. - Vikram Krishnamurthy, Omid Namvar Gharehshiran, Maziyar Hamdi:
Interactive Sensing and Decision Making in Social Networks. - Ali Bou Nassif, Luiz Fernando Capretz, Danny Ho:
Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation. - Ioana Oriana Bercea, Navin Goyal, David G. Harris, Aravind Srinivasan:
On Computing Maximal Independent Sets of Hypergraphs in Parallel. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Approximate Capacity of the Two-User MISO Broadcast Channel with Delayed CSIT. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:
Analysis of Degrees of Freedom of Wideband Random Multipath Fields Observed Over Time and Space Windows. - Hatem Abou-zeid, Hossam S. Hassanein, Stefan Valentin, Mohamed Fathy Feteiha:
A Lookback Scheduling Framework for Long-Term Quality-of-Service Over Multiple Cells. - Yishun Dong, Farzan Farnia, Ayfer Özgür:
Near Optimal Energy Control and Approximate Capacity of Energy Harvesting Communication. - Hani A. Qudaih, Mohammed A. Bawazir, Shuaibu Hassan Usman, Jamaludin Ibrahim:
Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization. - George Saad, Jared Saia:
Self-Healing Computation. - Daniel Le Berre:
Some thoughts about benchmarks for NMR. - Ulrich Furbach, Claudia Schon:
Semantically Guided Evolution of SHI ABoxes. - Petros T. Boufounos, Laurent Jacques, Felix Krahmer, Rayan Saab:
Quantization and Compressive Sensing. - Robert Mingesz, Gergely Vadai, Zoltan Gingl:
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? - Jian Yang, Jianjun Qian, Lei Luo, Fanlong Zhang, Yicheng Gao:
Nuclear Norm based Matrix Regression with Applications to Face Recognition with Occlusion and Illumination Changes. - Oscar M. Danielsson, Omid Aghazadeh:
Human Pose Estimation from RGB Input Using Synthetic Training Data. - Francisco Claude, Gonzalo Navarro, Alberto Ordóñez Pereira:
Efficient Compressed Wavelet Trees over Large Alphabets. - Sergio Cabello, Otfried Cheong, Lena Schlipf:
Finding Largest Rectangles in Convex Polygons. - Shahab Tasharrofi, Eugenia Ternovska:
Three Semantics for Modular Systems. - Abhishek Awasthi, Jörg Lässig, Oliver Kramer:
A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines. - Jon M. Kleinberg, Sigal Oren:
Time-Inconsistent Planning: A Computational Problem in Behavioral Economics. - Mario Alviano, Wolfgang Faber:
Semantics and Compilation of Answer Set Programming with Generalized Atoms. - Everardo Bárcenas
, Jesús Lavalle:
Global Numerical Constraints on Trees. - Michael X. Zhou:
Classic Lagrangian may not be applicable to the traveling salesman problem. - Giorgos Kouropoulos
:
Calculation software for efficiency and penetration of a fibrous filter medium based on the mathematical models of air filtration. - Brijender Kahanwal:
Comparative Study of the Function Overloading and Function Overriding Using C++. - Akhlaqur Rahman, Sumaira Tasnim:
Application of Machine Learning Techniques in Aquaculture. - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. - Rachel A. Ward:
A unified framework for linear dimensionality reduction in l1. - Wilhelmiina Hämäläinen:
General upper bounds for well-behaving goodness measures on dependency rules. - Olena Orobinska:
Automatic Method Of Domain Ontology Construction based on Characteristics of Corpora POS-Analysis. - Stefan Fafianie, Stefan Kratsch:
Streaming Kernelization. - Michael Kai Petersen:
When push comes to shove verbs literally shake due to latent semantic parameters of size and intensity. - Wilhelmiina Hämäläinen:
Assessing the statistical significance of association rules. - Namyoon Lee, David Morales-Jiménez, Angel E. Lozano, Robert W. Heath Jr.:
Spectral Efficiency of Dynamic Coordinated Beamforming: A Stochastic Geometry Approach. - Naman Agarwal, Guy Kindler, Alexandra Kolla, Luca Trevisan:
Unique Games on the Hypercube. - Ramin Pichevar, Jason Wung, Daniele Giacobello, Joshua Atkins:
Design and Optimization of a Speech Recognition Front-End for Distant-Talking Control of a Music Playback Device. - Calvin Newport:
Consensus with an Abstract MAC Layer. - Xiaozhe Wang, Hsiao-Dong Chiang:
Quasi Steady-State Model for Power System Stability: Limitations, Analysis and a Remedy. - Shamanth Kumar, Huan Liu, Sameep Mehta, L. Venkata Subramaniam:
From Tweets to Events: Exploring a Scalable Solution for Twitter Streams. - Shamim Ripon, Aoyan Barua, Mohammad Salah Uddin:
Analysis Tool for UNL-Based Knowledge Representation. - Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard:
New Algorithmic Approaches to Point Constellation Recognition. - Rui Song, Hyunsuk Ko, C.-C. Jay Kuo:
MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source. - Omar S. Soliman, Aliaa Rassem:
A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm. - Sallam Abualhaija, Karl-Heinz Zimmermann:
D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation. - Justin Cheng, Cristian Danescu-Niculescu-Mizil, Jure Leskovec:
How Community Feedback Shapes User Behavior. - Siamak Ravanbakhsh, Russell Greiner, Brendan J. Frey:
Training Restricted Boltzmann Machine by Perturbation. - Chenhao Tan, Lillian Lee, Bo Pang:
The effect of wording on message propagation: Topic- and author-controlled natural experiments on Twitter. - Chenhao Tan, Lillian Lee:
A Corpus of Sentence-level Revisions in Academic Writing: A Step towards Understanding Statement Strength in Communication. - Yimin Yang, Q. M. Jonathan Wu, Guangbin Huang, Yaonan Wang:
Pulling back error to the hidden-node parameter technology: Single-hidden-layer feedforward network without output weight. - Flavio V. D. de Figueiredo, Jussara M. Almeida, Yasuko Matsubara, Bruno Ribeiro, Christos Faloutsos:
Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries. - Daniel Cullina, Negar Kiyavash:
Generalized sphere-packing and sphere-covering bounds on the size of codes for combinatorial channels. - Flávio du Pin Calmon, Mayank Varia, Muriel Médard:
An Exploration of the Role of Principal Inertia Components in Information Theory. - Charalampos E. Tsourakakis:
A Novel Approach to Finding Near-Cliques: The Triangle-Densest Subgraph Problem. - Danai Koutra, Paul N. Bennett, Eric Horvitz:
Events and Controversies: Influences of a Shocking News Event on Information Seeking. - Abdul Quamar, Amol Deshpande, Jimmy Lin:
NScale: Neighborhood-centric Large-Scale Graph Analytics in the Cloud. - Esa Ollila, Hyon-Jung Kim, Visa Koivunen:
Robust iterative hard thresholding for compressed sensing. - Corinna Cortes, Mehryar Mohri, Andres Muñoz Medina:
Adaptation Algorithm and Theory Based on Generalized Discrepancy. - Manju Kaushik:
System Software: Concepts and Approach. - Sascha Kurz, Nicola Maaser, Stefan Napel, Matthias Weber:
Mostly Sunny: A Forecast of Tomorrow's Power Index Research. - Neha Gupta, Ponnurangam Kumaraguru:
Exploration of gaps in Bitly's spam detection and relevant counter measures. - Maria Spichkova:
Stream processing components: Isabelle/HOL formalisation and case studies. - Ibrahim M. Alabdulmohsin:
A Mathematical Theory of Learning. - A. Bhuvaneswari, E. George Dharma Prakash Raj, V. Sinthu Janita Prakash:
ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff. - Hanéne Mkaouar, Olfa Boubaker:
Compliant motion control for handling a single object by two similar industrial robots. - Holger H. Hoos, Marius Lindauer, Torsten Schaub:
claspfolio 2: Advances in Algorithm Selection for Answer Set Programming. - Bart Bogaerts, Joachim Jansen, Maurice Bruynooghe, Broes De Cat, Joost Vennekens, Marc Denecker:
Simulating dynamic systems using Linear Time Calculus theories. - Mohammad Mohammadi, Shahram Jafari:
An expert system for recommending suitable ornamental fish addition to an aquarium based on aquarium condition. - Hasan Abasi, Ali Z. Abdi, Nader H. Bshouty:
Learning Boolean Halfspaces with Small Weights from Membership Queries. - Ilya V. Otpuschennikov, Alexander A. Semenov, Stepan Kochemazov:
Transalg: a Tool for Translating Procedural Descriptions of Discrete Functions to SAT (Tool Paper). - Thomas Given-Wilson
, Daniele Gorla
, Barry Jay:
A Concurrent Pattern Calculus. - Sedat Görmüs, Mohammud Zubeir Bocus:
Efficient Cooperative Anycasting for AMI Mesh Networks. - Olaf Beyersdorff, Leroy Chew:
Tableau vs. Sequent Calculi for Minimal Entailment. - Jin-Li Guo, Qi Suo:
Comment on "Quantifying Long-term Scientific Impact". - Marcos Cramer, Pieter Van Hertum, Diego Agustín Ambrossio, Marc Denecker:
Modelling Delegation and Revocation Schemes in IDP. - Walid Gomaa:
Computability and Complexity over the Product Topology of Real Numbers. - Photios A. Stavrou, Christos K. Kourtellaris, Charalambos D. Charalambous:
Information Nonanticipative Rate Distortion Function and Its Applications. - Jacopo Staiano, Marco Guerini:
DepecheMood: a Lexicon for Emotion Analysis from Crowd-Annotated News. - Julie De Pril, János Flesch, Jeroen Kuipers, Gijs Schoenmakers, Koos Vrieze:
Existence of Secure Equilibrium in Multi-Player Games with Perfect Information. - Valerio Capraro, Conor Smyth, Kalliopi Mylona, Graham Niblo:
Benevolent characteristics promote cooperative behaviour among humans. - Victor Sadikov, Walter Pidkameny:
Complete Separation of the 3 Tiers - Divide and Conquer. - Zheng Wang, Cong Ling, Guillaume Hanrot:
Markov Chain Monte Carlo Algorithms for Lattice Gaussian Sampling. - Jie Fu, Rayna Dimitrova, Ufuk Topcu:
Abstractions and sensor design in partial-information, reactive controller synthesis. - Shay Kutten, Danupon Nanongkai, Gopal Pandurangan, Peter Robinson:
Distributed Symmetry Breaking in Hypergraphs. - Abuzer Yakaryilmaz, A. C. Cem Say, H. Gökalp Demirci:
Debates with small transparent quantum verifiers. - Ankit Garg, Tengyu Ma, Huy L. Nguyen:
Lower Bound for High-Dimensional Statistical Learning Problem via Direct-Sum Theorem. - Mohsen Ghaffari, Erez Kantor, Nancy A. Lynch, Calvin C. Newport:
Multi-Message Broadcast with Abstract MAC Layers and Unreliable Links. - Stefano Teso, Roberto Sebastiani, Andrea Passerini:
Structured Learning Modulo Theories. - (Withdrawn) RPCA-KFE: Key Frame Extraction for Consumer Video based Robust Principal Component Analysis.
- Chris Kimble:
What Cost Knowledge Management? The Example of Infosys. - (Withdrawn) Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance.
- Christoph Lenzen, Nancy A. Lynch, Calvin C. Newport, Tsvetomira Radeva:
Trade-offs between Selection Complexity and Performance when Searching the Plane without Communication. - Ling Fang, Yoriyuki Yamagata
, Yutaka Oiwa:
Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking. 35-49 - Raman Grover, Michael J. Carey:
Scalable Fault-Tolerant Data Feeds in AsterixDB. - Kutlu Emre Yilmaz:
Entropy Based Cartoon Texture Separation. - Tiep Le, Enrico Pontelli, Tran Cao Son, William Yeoh:
Logic and Constraint Logic Programming for Distributed Constraint Optimization. - Kutlu Emre Yilmaz, Ahmet Arslan, Özgür Yilmazel:
Turkish Text Retrieval Experiments Using Lemur Toolkit. - Bluma Gelley, Ajita John:
Like, Comment, Repin: User Interaction on Pinterest. - Massimo Franceschetti:
On Landau's eigenvalue theorem and information cut-sets. - Arka Bhattacharya:
Approximation Algorithms for the Asymmetric Traveling Salesman Problem : Describing two recent methods. - Ritesh Kolte, Ayfer Özgür, Suhas N. Diggavi:
When are dynamic relaying strategies necessary in half-duplex wireless networks? - Melika Abolhassani, MohammadHossein Bateni, MohammadTaghi Hajiaghayi, Hamid Mahini, Anshul Sawant:
Network Cournot Competition. - Hamed Haddadi, Georgios Smaragdakis, K. K. Ramakrishnan:
Opportunities in a Federated Cloud Marketplace. - Muthuraman Thangaraj, V. Gayathri:
A Retrieval Mechanism for Multi-versioned Digital Collection Using TAG. - Deepjoy Das, Sarat Saharia:
Implementation And Performance Evaluation Of Background Subtraction Algorithms. - N. V. S. N. Sarma, Mahesh Gopi:
Energy Efficient Clustering using Jumper Firefly Algorithm in Wireless Sensor Networks. - Haifa Mehdi, Olfa Boubaker:
Robust Tracking Control for Constrained Robots. - Ahmed Saeed, Azin Neishaboori, Amr Mohamed, Khaled A. Harras:
Up and Away: A Cheap UAV Cyber-Physical Testbed (Work in Progress). - Lorenz Klaus:
A Strongly Polynomial Reduction for Linear Programs over Grids. - Bart Bogaerts, Joost Vennekens, Marc Denecker, Jan Van den Bussche:
FO(C): A Knowledge Representation Language of Causality. - Meng Guo, Jana Tumova, Dimos V. Dimarogonas:
Cooperative Decentralized Multi-agent Control under Local LTL Tasks and Connectivity Constraints. - Emanuel Lacic, Dominik Kowald, Lukas Eberhard, Christoph Trattner, Denis Parra, Leandro Balby Marinho:
Utilizing Online Social Network and Location-Based Data to Recommend Items in an Online Marketplace. - Javier Esparza:
Keeping a Crowd Safe: On the Complexity of Parameterized Verification (Corrected version). - Emanuel Lacic, Dominik Kowald, Christoph Trattner:
SocRecM: A Scalable Social Recommender Engine for Online Marketplaces. - P. Cynthia Selvi, A. R. Mohammed Shanavas:
Output Privacy Protection With Pattern-Based Heuristic Algorithm. - Hisham Elshaer, Federico Boccardi, Mischa Dohler, Ralf Irmer:
Downlink and Uplink Decoupling: a Disruptive Architectural Design for 5G Networks. - Atreyee Kundu, Niranjan Balachandran, Debasish Chatterjee:
Algorithmic synthesis of stabilizing switching signals for discrete-time switched linear systems. - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Modeling Bitcoin Contracts by Timed Automata. - Bojana Koteska, Anastas Misev:
Change Management and Version Control of Scientific Applications. - Valery A. Ugrinovskii, Emilia Fridman:
A Round-Robin Type Protocol for Distributed Estimation with H∞ Consensus. - Antonia Wachter-Zeh, Tuvi Etzion:
Optimal Ferrers Diagram Rank-Metric Codes. - Kristina Ban, Ana Mestrovic, Sanda Martincic-Ipsic:
Initial Comparison of Linguistic Networks Measures for Parallel Texts. - Michael Hoffmann, Vincent Kusters, Tillmann Miltzow:
Halving Balls in Deterministic Linear Time. - Christian Schulz, Christoph von Tycowicz, Hans-Peter Seidel, Klaus Hildebrandt:
Proofs of two Theorems concerning Sparse Spacetime Constraints. - Márta Czenky:
The Efficiency Examination of Teaching of Different Normalization Methods. - Kazuki Kajiwara, Tuan Phung-Duc:
Asymptotic and Numerical Analysis of Multiserver Retrial Queue with Guard Channel for Cellular Networks. - Tebbi Hanane, Azzoune Hamid:
An Expert System for Automatic Reading of A Text Written in Standard Arabic. - Kimia Ghaffari, Mohammad Soltani Delgosha, Neda Abdolvand:
Towards Cloud Computing: A SWOT Analysis on its Adoption in SMEs. - Mohamed A. Hassan:
Hybrid Intelligent System; A Self-Adaptive Network Protection System "Using Soft Computing and Open-Source Tools". - Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato:
Distributed Interference-Aware Energy-Efficient Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks. - Antimo Barbato, Antonio Capone, Lin Chen, Fabio Martignon, Stefano Paris:
A Distributed Demand-Side Management Framework for the Smart Grid. - Ayushi Sinha, William R. Gray Roncal, Narayanan Kasthuri, Jeff W. Lichtman, Randal C. Burns, Michael M. Kazhdan:
Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes using High-Resolution Neural EM Data. - M. Rajalakshmi, P. Subashini:
Texture Based Image Segmentation of Chili Pepper X-Ray Images Using Gabor Filter. - Prajakta P. Khairnar, C. A. Manjare:
Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms. - Sergio Consoli, José Andrés Moreno-Pérez, Kenneth Darby-Dowman, Nenad Mladenovic:
Mejora de la exploracion y la explotacion de las heuristicas constructivas para el MLSTP. - John Francisco, Victor Sadikov:
Structured Approach to Web Development. - Mohamed Mbida, Abdellah Ezzati:
OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks. - William A. Sethares, Selçuk S. Bayin:
Model-Driven Applications of Fractional Derivatives and Integrals. - Amr Abdelnasser, Ekram Hossain, Dong In Kim:
Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks. - Christoph Lenzen, Boaz Patt-Shamir:
Improved Distributed Steiner Forest Construction. - Ahmed Hamdi Sakr, Ekram Hossain:
Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis. - Hesham ElSawy, Ekram Hossain:
Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks. - Tobias Fehenberger, Norbert Hanik:
Mutual Information as a Figure of Merit for Optical Fiber Systems. - Rahali Bochra, Mohammed Feham, Junwu Tao:
Analysis of S Band Substrate Integrated Waveguide Power Divider, Circulator and Coupler. - Hsien-Pu Chen, Laszlo B. Kish, Claes-Goran Granqvist, Gabor Schmera:
On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott. - Jeffrey Sukharev, Leonid Zhukov, Alexandrin Popescul:
Learning Alternative Name Spellings. - K. Sankeerth Rao, Vinod M. Prabhakaran:
A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels. - Ari Saptawijaya, Luís Moniz Pereira:
Joint Tabling of Logic Program Abductions and Updates. - Sriram Vajapeyam:
Understanding Shannon's Entropy metric for Information. - Pengfei Wan, Gene Cheung, Philip A. Chou, Dinei A. F. Florêncio, Cha Zhang, Oscar C. Au:
Precision Enhancement of 3D Surfaces from Multiple Compressed Depth Maps. - Bob J. Scurlock:
Use of ARAS 360 to Facilitate Rapid Development of Articulated Total Body Biomechanical Physics Simulations. - Jehad Al-Dallal:
How and When to Flatten Java Classes? - Chris Kimble:
Electronic Health Records: Cure-all or Chronic Condition? - Osvaldo Simeone, Elza Erkip, Shlomo Shamai:
Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint. - Anna Ma, Arjuna Flenner, Deanna Needell, Allon G. Percus:
Improving Image Clustering using Sparse Text and the Wisdom of the Crowds. - Zoltán Szabó:
Information Theoretical Estimators Toolbox. - Yanting Ma, Jin Tan, Nikhil Krishnan, Dror Baron:
Empirical Bayes and Full Bayes for Signal Estimation. - Xiaohao Cai:
Variational Image Segmentation Model Coupled with Image Restoration Achievements. - Arash Batni, Farshad Safaei:
A New Multi-Tiered Solid State Disk Using Slc/Mlc Combined Flash Memory. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:
Band Limited Signals Observed Over Finite Spatial and Temporal Windows: An Upper Bound to Signal Degrees of Freedom. - Elham Shadkam, Mehdi Bijari:
Evaluation The Efficiency Of Cuckoo Optimization Algorithm. - Madhumangal Pal, Anita Pal:
Scheduling algorithm to select $k$ optimal programme slots in television channels: A graph theoretic approach. - Dani Korpi, Lauri Anttila, Mikko Valkama:
Reference Receiver Aided Digital Self-Interference Cancellation in MIMO Full-Duplex Transceivers. - Dirk Lewandowski:
Evaluating the retrieval effectiveness of Web search engines using a representative query sample. - Dirk Lewandowski:
Why we need an independent index of the Web. - Nilesh Khambekar, Chad M. Spooner, Vipin Chaudhary:
Going Towards Discretized Spectrum Space: Quantification of Spectrum Consumption Spaces and a Quantified Spectrum Access Paradigm. - Stefano Rini, Shlomo Shamai:
On Capacity of the Dirty Paper Channel with Fading Dirt in the Strong Fading Regime. - Fatima Zohra Hadjam, Claudio Moraga:
Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits. - Saptarshi Chakraborty, Dhrubajyoti Das:
An Overview of Face Liveness Detection. - Le Li, Jianjun Yang, Kaili Zhao, Yang Xu, Honggang Zhang, Zhuoyi Fan:
Graph Regularized Non-negative Matrix Factorization By Maximizing Correntropy. - Michael S. Gashler, Stephen C. Ashmore:
Training Deep Fourier Neural Networks To Fit Time-Series Data. - Camellia Ray, Jayanta Kumar Das, Pabitra Pal Choudhury:
On Analysis and Generation of some Biologically Important Boolean Functions. - Robert J. Lyon, J. M. Brooke, Joshua D. Knowles, Benjamin W. Stappers:
Hellinger Distance Trees for Imbalanced Streams. - Frank Hannig, Jürgen Teich:
Proceedings of the First Workshop on Resource Awareness and Adaptivity in Multi-Core Computing (Racing 2014). - Shaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi:
Nonparametric Detection of Anomalous Data via Kernel Mean Embedding. - Andrés Altieri, Pablo Piantanida, Leonardo Rey Vega, Cecilia G. Galarza:
On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks. - Thomas Bläsius, Guido Brückner, Ignaz Rutter:
Complexity of Higher-Degree Orthogonal Graph Embedding in the Kandinsky Model. - Piero Giacomelli, Åsa Smedberg:
The Eve of 3D Printing in Telemedicine: State of the Art and Future Challenges. - Bryan Poling, Gilad Lerman, Arthur Szlam:
Better Feature Tracking Through Subspace Constraints. - Elaine Pimentel, Carlos Olarte, Vivek Nigam:
A Proof Theoretic Study of Soft Concurrent Constraint Programming. - Sawood Alam, Charles L. Cartledge, Michael L. Nelson:
Support for Various HTTP Methods on the Web. - Jan Hazla, Thomas Holenstein:
Upper Tail Estimates with Combinatorial Proofs. - Yan Fang, Matthew J. Cotter, Donald M. Chiarulli, Steven P. Levitan:
Image Segmentation Using Frequency Locking of Coupled Oscillators. - Shahab Kaynama, Jeremy H. Gillula, Claire J. Tomlin:
A sampling-based approach to scalable constraint satisfaction in linear sampled-data systems - Part I: Computation. - Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. - Oswin Aichholzer, Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Michael Hoffmann, Anna Lubiw, Jack Snoeyink, Andrew Winslow:
Covering Folded Shapes. - Srayan Datta:
Predicting Central Topics in a Blog Corpus from a Networks Perspective. - Meng Wang, Tharaka Samarasinghe, Jamie S. Evans:
Transmission Rank Selection for Opportunistic Beamforming with Quality of Service Constraints. - Alexis Huck, François de Vieilleville, Pierre Weiss, Manuel Grizonnet:
Hyperspectral pan-sharpening: a variational convex constrained formulation to impose parallel level lines, solved with ADMM. - Norikazu Sugimoto, Voot Tangkaratt, Thijs Wensveen, Tingting Zhao, Masashi Sugiyama, Jun Morimoto:
Efficient Reuse of Previous Experiences to Improve Policies in Real Environment. - Reto Speck, Tobias Blanke, Conny Kristel, Michal Frankl, Kepa Joseba Rodríguez, Veerle Vanden Daelen:
The Past and the Future of Holocaust Research: From Disparate Sources to an Integrated European Holocaust Research Infrastructure. - Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:
G4LTL-ST: Automatic Generation of PLC Programs. - Md. Habibur Rahman, Mohammad Nasiruddin:
Impact of Two Realistic Mobility Models for Vehicular Safety Applications. - Kerstin Andersson:
Exact Probability Distribution versus Entropy. - Amit Daniely, Shai Shalev-Shwartz:
Optimal Learners for Multiclass Problems. - Stefano Riverso, Fabio Sarzo, Giancarlo Ferrari-Trecate
:
Plug-and-play voltage and frequency control of islanded microgrids with meshed topology. - Florent Foucaud, George B. Mertzios, Reza Naserasr, Aline Parreau, Petru Valicov:
Identification, location-domination and metric dimension on interval and permutation graphs. - Giuseppe Antonio Di Luna, Paola Flocchini, Sruti Gan Chaudhuri, Nicola Santoro, Giovanni Viglietta:
Robots with Lights: Overcoming Obstructed Visibility Without Colliding. - Lijiang Chen:
Coordinate System Selection for Minimum Error Rate Training in Statistical Machine Translation. - A. N. Trahtman:
The length of a minimal synchronizing word and the Černy conjecture. - Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, Marcin Wrochna:
Reconfiguration over tree decompositions. - Nima Anari, Gagan Goel, Afshin Nikzad:
Mechanisms Design for Crowdsourcing: An Optimal 1-1/e Approximate Budget-Feasible Mechanism for Large Markets. - Moshe Schwartz, Muriel Médard:
Quasi-linear Network Coding. - Götz E. Pfander, Pavel Zheltov:
Estimation of Overspread Scattering Functions. - Achilles Beros, Colin de la Higuera:
A Canonical Semi-Deterministic Transducer. - Nicola Gatti, Alessandro Lazaric, Marco Rocco, Francesco Trovò:
Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities. - Zubair Nabi:
The Zen of Graduate-level Programming. - Hamidreza Boostanimehr, Vijay K. Bhargava:
Unified and Distributed QoS-Driven Cell Association Algorithms in Heterogeneous Networks. - Luciano Caroprese, Irina Trubitsyna, Miroslaw Truszczynski, Ester Zumpano:
A Measure of Arbitrariness in Abductive Explanations. - Jeffrey M. Druce, Jarvis D. Haupt, Stefano Gonella:
Anomaly-Sensitive Dictionary Learning for Unsupervised Diagnostics of Solid Media. - Roman Barták, Neng-Fa Zhou:
Using Tabled Logic Programming to Solve the Petrobras Planning Problem. - Hadassa Daltrophe, Shlomi Dolev, Zvi Lotker:
Big Data Representation as High Dimensional Configuration. - Zubair Nabi:
A $35 Firewall for the Developing World. - Nikzad Babaii Rizvandi:
Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems. - Chulong Liang, Xiao Ma, Qiutao Zhuang, Baoming Bai:
Spatial Coupling of Generator Matrix: A General Approach to Design of Good Codes at a Target BER. - Dor Arad, Yael Mordechai, Hadas Shachnai:
Tighter Bounds for Makespan Minimization on Unrelated Machines. - Neng-Fa Zhou:
Combinatorial Search With Picat. - Dushyant Vaghela, Kapildev Naina:
A Review of Image Mosaicing Techniques. - Ryoma Sin'ya:
Graph Spectral Properties of Deterministic Finite Automata. - Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to Securely Compute the Modulo-Two Sum of Binary Sources. - George Souza Oliveira, Anderson Faustino da Silva:
Towards an Efficient Prolog System by Code Introspection. - Kazuya Haraguchi:
An Efficient Local Search for Partial Latin Square Extension Problem. - Antonis G. Gotsis, Stelios Stefanatos, Angeliki Alexiou:
Spatial Coordination Strategies in Future Ultra-Dense Wireless Networks. - Aleksandar Haber, Michel Verhaegen:
Sparse approximate inverses of Gramians and impulse response matrices of large-scale interconnected systems. - Rahul Tejwani:
Sentiment Analysis: A Survey. - Ilias Tachmazidis, Grigoris Antoniou, Wolfgang Faber:
Efficient Computation of the Well-Founded Semantics over Big Data. - (Withdrawn) Decoding and Computing Algorithms for Linear Superposition LDPC Coded Systems.
- Yuyi Wang, Jan Ramon, Zheng-Chu Guo:
Learning from networked examples. - Bocong Chen, San Ling, Guanghui Zhang:
Self-dual cyclic codes over finite chain rings. - Hassan Ghozlan, Gerhard Kramer:
Phase Modulation for Discrete-time Wiener Phase Noise Channels with Oversampling at High SNR. - Wenbin Zhang, Steven Skiena:
News-Based Group Modeling and Forecasting. - Paul L. Borrill, Mark Burgess, Todd Craw, Mike Dvorkin:
A Promise Theory Perspective on Data Networks. - Xavier Lacoste, Mathieu Faverge, George Bosilca, Pierre Ramet, Samuel Thibault:
Taking advantage of hybrid systems for sparse direct solvers via task-based runtimes. - K. Jyothi, C. J. Prabhakar:
Multi Modal Face Recognition Using Block Based Curvelet Features. - Radhakrishnan Delhibabu:
An Abductive Framework for Horn Knowledge Base Dynamics. - Ronald Ortner, Odalric-Ambrym Maillard, Daniil Ryabko:
Selecting Near-Optimal Approximate State Representations in Reinforcement Learning. - Ji Zhao, Deyu Meng:
FastMMD: Ensemble of Circular Discrepancy for Efficient Two-Sample Test. - Tanmoy Sarkar, Sugata Sanyal:
Reversible and Irreversible Data Hiding Technique. - Manish B. Dave, Mitesh B. Nakrani:
Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques. - Sergio Castro, Kim Mens, Paulo Moura
:
Customisable Handling of Java References in Prolog Programs. - Sabina Sisovic, Sanda Martincic-Ipsic, Ana Mestrovic:
Comparison of the language networks from literature and blogs. - Paolo Zuliani:
Statistical Model Checking for Biological Applications. - Nafay Hifzur Rehman, Neelam Verma:
Application of Modified Multi Model Predictive Control Algorithm to Fluid Catalytic Cracking Unit. - Elisa Gorla, Maike Massierer:
An optimal representation for the trace zero subgroup. - Omer H. Abdelrahman, Erol Gelenbe:
Signalling Storms in 3G Mobile Networks. - Elisa Gorla, Alberto Ravagnani:
Subspace codes from Ferrers diagrams. - Myrto Arapinis, Stéphanie Delaune, Steve Kremer
:
Dynamic Tags for Security Protocols. - Erol Gelenbe, Omer H. Abdelrahman:
Search in the Universe of Big Networks and Data. - Burak Çakmak, Ole Winther, Bernard H. Fleury:
S-AMP: Approximate Message Passing for General Matrix Ensembles. - Xiongbin Rao, Vincent K. N. Lau:
Distributed Compressive CSIT Estimation and Feedback for FDD Multi-user Massive MIMO Systems. - Theofrastos Mantadelis, Ricardo Rocha, Paulo Moura:
Tabling, Rational Terms, and Coinduction Finally Together! - Amira Aloulou, Olfa Boubaker:
A Relevant Reduction Method for Dynamic Modeling of a Seven-linked Humanoid Robot in the Three-dimensional Space. - Jun Wang, Ke Sun, Fei Sha, Stéphane Marchand-Maillet, Alexandros Kalousis:
Two-Stage Metric Learning. - Aya Saad, Thom W. Frühwirth, Carmen Gervet:
The P-Box CDF-Intervals: A Reliable Constraint Reasoning with Quantifiable Information. - Quentin Gemine, Damien Ernst, Bertrand Cornélusse:
Active network management for electrical distribution systems: problem formulation and benchmark. - Sanket S. Kalamkar, Adrish Banerjee:
On the Effect of Primary User Traffic on Secondary Throughput and Outage Probability Under Rayleigh Flat Fading Channel. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal. - Ahmed El Shafie, Tamer Khattab:
On Orthogonal Band Allocation for Multi-User Mutli-Band Cognitive Radio Networks. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:
Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User. - Alessio Meneghetti, Massimiliano Sala, Alessandro Tomasi:
A weight-distribution bound for entropy extractors using linear binary codes. - Xu Chen, Jianwei Huang:
Imitation-based Social Spectrum Sharing. - José R. Correa, Tobias Harks, Vincent J. C. Kreuzen, Jannik Matuschke:
Fare Evasion in Transit Networks. - Akshay Kumar, Ravi Tandon, T. Charles Clancy:
On the Latency of Erasure-Coded Cloud Storage Systems. - Ernst D. Berg:
Introduction to Dynamic Unary Encoding. - Georg Gottlob, Giorgio Orsi, Andreas Pieris:
Query Rewriting and Optimization for Ontological Databases. - Miguel Areias
, Ricardo Rocha
:
A Simple and Efficient Lock-Free Hash Trie Design for Concurrent Tabling. - Taolue Chen, Stefan Kiefer:
On the Total Variation Distance of Labelled Markov Chains. - Scott A. Hale, Taha Yasseri, Josh Cowls, Eric T. Meyer, Ralph Schroeder, Helen Z. Margetts:
Mapping the UK Webspace: Fifteen Years of British Universities on the Web. - Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik:
Secure Fragmentation for Content-Centric Networks. - Georgios Papadopoulos, Hanna Kurniawati, Nicholas M. Patrikalakis:
Analysis of Asymptotically Optimal Sampling-based Motion Planning Algorithms for Lipschitz Continuous Dynamical Systems. - Dimitri Kartsaklis, Mehrnoosh Sadrzadeh
:
A Study of Entanglement in a Categorical Framework of Natural Language. 249-261 - Chien-Ju Ho, Aleksandrs Slivkins, Jennifer Wortman Vaughan:
Adaptive Contract Design for Crowdsourcing Markets: Bandit Algorithms for Repeated Principal-Agent Problems. - Ahmed Hamdi Sakr, Ekram Hossain:
Location-Aware Cross-Tier Coordinated Multipoint Transmission in Two-Tier Cellular Networks. - Bruno Scherrer:
Approximate Policy Iteration Schemes: A Comparison. - Kartik Talamadupula, David E. Smith, Subbarao Kambhampati:
The Metrics Matter! On the Incompatibility of Different Flavors of Replanning. - Simone Bova, Robert Ganian, Stefan Szeider:
Model Checking Existential Logic on Partially Ordered Sets. - Klaus Reinhardt, Abuzer Yakaryilmaz:
The minimum amount of useful space: New results and new directions. - Swanand Kadhe, Alex Sprintson:
Weakly Secure Regenerating Codes for Distributed Storage. - Sushant Chaudhary:
Load Frequency Control For Distributed Grid Power System Single Area & Multi-area System. - Vahid Lari, Alexandru Tanase, Frank Hannig, Jürgen Teich:
Massively Parallel Processor Architectures for Resource-aware Computing. - Johny Paul, Walter Stechele, Manfred Kröhnert, Tamim Asfour:
Resource-Aware Programming for Robotic Vision. - Elisabeth Glocker, Qingqing Chen, Asheque M. Zaidi, Ulf Schlichtmann, Doris Schmitt-Landsiedel:
Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture. - Oliver Mattes, Wolfgang Karl:
Evaluating the Self-Optimization Process of the Adaptive Memory Management Architecture Self-aware Memory. - Manfred Kröhnert, Nikolaus Vahrenkamp, Johny Paul, Walter Stechele, Tamim Asfour:
Resource Prediction for Humanoid Robots. - Mario Kicherer, Wolfgang Karl:
Heterogeneity-aware Fault Tolerance using a Self-Organizing Runtime System. - Björn Döbel, Robert Muschner, Hermann Härtig:
Resource-Aware Replication on Heterogeneous Multicores: Challenges and Opportunities. - Hananeh Aliee, Liang Chen, Mojtaba Ebrahimi, Michael Glaß, Faramarz Khosravi, Mehdi Baradaran Tahoori:
Towards Cross-layer Reliability Analysis of Transient and Permanent Faults. - Christoph W. Keßler, Usman Dastgeer, Lu Li:
Optimized Composition: Generating Efficient Code for Heterogeneous Systems from Multi-Variant Components, Skeletons and Containers. - Andi Drebes, Karine Heydemann, Antoniu Pop, Albert Cohen, Nathalie Drach:
Automatic Detection of Performance Anomalies in Task-Parallel Programs. - Aurang Zaib, Prashanth Raju, Thomas Wild, Andreas Herkersdorf:
A Layered Modeling and Simulation Approach to investigate Resource-aware Computing in MPSoCs. - Thomas Karcher, Christopher Guckes, Walter F. Tichy:
Autotuning and Self-Adaptability in Concurrency Libraries. - Hadi Daneshmand, Manuel Gomez-Rodriguez, Le Song, Bernhard Schölkopf:
Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm. - Jiang Wang, Xiaohan Nie, Yin Xia, Ying Wu, Song-Chun Zhu:
Cross-view Action Modeling, Learning and Recognition. - H. Lydia Deng, John A. Scales:
Characterizing the Topography of Multi-dimensional Energy Landscapes. - Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel E. Lozano, Anthony C. K. Soong, Jianzhong (Charlie) Zhang:
What Will 5G Be? - Luca Venturino, Alessio Zappone, Chiara Risi, Stefano Buzzi:
Energy-Efficient Scheduling and Power Allocation in Downlink OFDMA Networks with Base Station Coordination. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:
Multicell Coordinated Beamforming with Rate Outage Constraint-Part I: Complexity Analysis. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:
Multicell Coordinated Beamforming with Rate Outage Constraint-Part II: Efficient Approximation Algorithms. - Alessio Venticinque, Nicola Mazzocca, Salvatore Venticinque, Massimo Ficco:
Semantic Support for Log Analysis of Safety-Critical Embedded Systems. - (Withdrawn) Entropies from Markov Models as Complexity Measures of Embedded Attractors.
- Roberto Baldoni, Mario Caruso, Adriano Cerocchi, Claudio Ciccotelli, Luca Montanari, Luca Nicoletti:
Correlating power consumption and network traffic for improving data centers resiliency. - Alessia Garofalo, Cesario Di Sarno, Ilaria Matteucci, Marco Vallini, Valerio Formicola:
Closing the loop of SIEM analysis to Secure Critical Infrastructures. - Alexander B. Romanovsky, Marc-Olivier Killijian:
The Tenth European Dependable Computer Conference. - Maria Spichkova:
Compositional properties of crypto-based components. - Maria Spichkova:
Formalisation and Analysis of Component Dependencies. - Zeeshan Bhatti, Ahmad Waqas, Imdad Ali Ismaili, Dil Nawaz Hakro, Waseem Javaid Soomro:
Phonetic based SoundEx & ShapeEx algorithm for Sindhi Spell Checker System. - Pinar Sen, Ali Özgür Yilmaz:
A Low-Complexity Graph-Based LMMSE Receiver for MIMO ISI Channels with M-QAM Modulation. - Pierre Ganty, Radu Iosif:
Generating Bounded Languages Using Bounded Control Sets. - Raphael Poss:
Haskell for OCaml programmers. - Raphael Poss:
Categories from scratch. - Neli Blagus, Gregor Weiss, Lovro Subelj:
Sampling node group structure of social and information networks. - Olfa Boubaker:
The inverted Pendulum: A fundamental Benchmark in Control Theory and Robotics. - (Withdrawn) A Cognitive Model for Humanoid Robot Navigation and Mapping using Alderbaran NAO.
- Boris Konev
, Alexei Lisitsa:
Computer-Aided Proof of Erdos Discrepancy Properties. - Joachim Breitner:
The Correctness of Launchbury's Natural Semantics for Lazy Evaluation. - Andrea Monacchi, Dominik Egarter, Wilfried Elmenreich, Salvatore D'Alessandro, Andrea M. Tonello:
GREEND: An Energy Consumption Dataset of Households in Italy and Austria. - Yosra Arous, Olfa Boubaker:
Gait trajectory generation for a five link bipedal robot based on a reduced dynamical model. - Bichen Shi, Georgiana Ifrim, Neil Hurley:
Be In The Know: Connecting News Articles to Relevant Twitter Conversations. - Jean-Marc Kelif, Olivier Simon:
Impact of Directional Receiving Antennas on Wireless Networks. - Leila Pishdad, Fabrice Labeau:
A New Reduction Scheme for Gaussian Sum Filters. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:
Clonal-Based Cellular Automata in Bioinformatics. - Behnam Neyshabur, Yury Makarychev, Nathan Srebro:
Clustering, Hamming Embedding, Generalized LSH and the Max Norm. - Jian Zhang, Debin Zhao, Ruiqin Xiong, Siwei Ma, Wen Gao:
Image Restoration Using Joint Statistical Modeling in Space-Transform Domain. - Yong Deng:
D numbers theory: a generalization of Dempster-Shafer evidence theory. - Shangping Wang, Ru Zhao:
Lattice-Based Ring Signature Scheme under the Random Oracle Model. - Yuanming Shi, Jun Zhang, Khaled Ben Letaief:
Scalable Coordinated Beamforming for Dense Wireless Cooperative Networks. - Majid Gerami, Ming Xiao, Jun Li, Carlo Fischione, Zihuai Lin:
Repair for Distributed Storage Systems in Packet Erasure Networks. - Kaeser Md. Sabrin, Md. Haider Ali:
An Intelligent Pixel Replication Technique by Binary Decomposition for Digital Image Zooming. - Hasnae Rahimi, Hanan El Bakkali:
A New Trust Reputation System for E-Commerce Applications. - Parvathavarthini S., Shanthakumari R:
An Adaptive Watermarking Process in Hadamard Transform. - Jeremy Kun, Rajmonda Caceres, Kevin Carter:
Locally Boosted Graph Aggregation for Community Detection. - Elena Bellodi, Evelina Lamma, Fabrizio Riguzzi, Vítor Santos Costa, Riccardo Zese:
Lifted Variable Elimination for Probabilistic Logic Programming. - Éric Badouel, Loïc Hélouët, Georges Edouard Kouamou, Christophe Morvan:
A Grammatical Approach to Data-centric Case Management in a Distributed Collaborative Environment. - Manel Tagorti, Bruno Scherrer:
Rate of Convergence and Error Bounds for LSTD(λ). - S. Karimi, K. B. Nakshatrala:
A monolithic multi-time-step computational framework for advective-diffusive-reactive transient systems with disparate scales. - Chakir Tajani, Jaafar Abouchabaka:
An Alternating KMF Algorithm to Solve the Cauchy Problem for Laplaces Equation. - David A. Kosower, Juan J. Lopez-Villarejo:
Flowgen: Flowchart-Based Documentation for C++ Codes. - Eric Gribkoff, Guy Van den Broeck, Dan Suciu:
Understanding the Complexity of Lifted Inference and Asymmetric Weighted Model Counting. - Emmanuel Abbe, Afonso S. Bandeira, Georgina Hall:
Exact Recovery in the Stochastic Block Model. - Nicholas Kersting:
Fast and Fuzzy Private Set Intersection. - Tim Althoff, Cristian Danescu-Niculescu-Mizil, Dan Jurafsky:
How to Ask for a Favor: A Case Study on the Success of Altruistic Requests. - Samuel D. Johnson, Tsai-Ching Lu:
Algorithm Instance Games. - Claudio Maruccio, Laura De Lorenzis, Luana Persano, Dario Pisignano:
Computational homogenization of fibrous piezoelectric materials. - Beniamino Accattoli, Ugo Dal Lago:
Beta Reduction is Invariant, Indeed (Long Version). - Omar Besbes, Yonatan Gur, Assaf Zeevi:
Optimal Exploration-Exploitation in a Multi-Armed-Bandit Problem with Non-stationary Rewards. - James Neufeld, András György, Dale Schuurmans, Csaba Szepesvári:
Adaptive Monte Carlo via Bandit Allocation. - Aviad Rubinstein:
Inapproximability of Nash Equilibrium. - Niall Douglas:
Large Code Base Change Ripple Management in C++: My thoughts on how a new Boost C++ Library could help. - M. Ehsan Shafiee, Emily M. Zechman:
An Agent-based Modeling Framework for Sociotechnical Simulation of Water Distribution Contamination Events. - Jian Gao:
Linear Codes over Z9+uZ9 MacWilliams Identity, Self-Dual Codes, Quadratic Residue Codes and Constacyclic Codes. - Jian Zhang, Debin Zhao, Wen Gao:
Group-based Sparse Representation for Image Restoration. - Feng Lu, Ziqiang Chen:
Newton-Type Iterative Solver for Multiple View $L2$ Triangulation. - Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa:
Which one is better: presentation-based or content-based math search? - Mingrui Yang, Frank de Hoog:
New Coherence and RIP Analysis for Weak Orthogonal Matching Pursuit. - Cengis Hasan, Eitan Altman, Jean-Marie Gorce:
On the Nash Stability in the Hedonic Coalition Formation Games. - Rehan Abdul Aziz, Geoffrey Chu, Peter James Stuckey:
Grounding Bound Founded Answer Set Programs. - Yi Bi, Jia-Huai You, Zhiyong Feng:
A Well-Founded Semantics for FOL-Programs. - Rehan Abdul Aziz:
Bound Founded Answer Set Programming. - Lurong Jiang, Xinyu Jin, Yongxiang Xia, Bo Ouyang, Duanpo Wu, Xi Chen:
A Scale-Free Topology Construction Model for Wireless Sensor Networks. - Anthony Hunter, Matthias Thimm:
Probabilistic Argumentation with Epistemic Extensions and Incomplete Information. - Mboni Kibelloh, Yukun Bao:
Perceptions of International Female Students Towards E-learning in Resolving High Education and Family Role Strain. - Rafael Lahoz-Beltra:
The "crisis of noosphere" as a limiting factor to achieve the point of technological singularity. - Mboni Kibelloh, Yukun Bao:
Can Online MBA Programs Allow Professional Working Mothers to Balance Work, Family, and Career Progression? A Case Study in China. - Samaneh Khoshrou, Jaime S. Cardoso
, Luís Filipe Teixeira:
Active Mining of Parallel Video Streams. - Sana Stojanovic, Julien Narboux, Marc Bezem, Predrag Janicic:
A Vernacular for Coherent Logic. - Gregory J. Duck, Rémy Haemmerlé, Martin Sulzmann:
On Termination, Confluence and Consistent CHR-based Type Inference. - Shangping Wang, Fang Feng:
Large Universe Attribute-Based Encryption Scheme from Lattices. - Nir Ailon, Thorsten Joachims, Zohar Shay Karnin:
Reducing Dueling Bandits to Cardinal Bandits. - Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim:
Efficient classification using parallel and scalable compressed model and Its application on intrusion detection. - Aftab Ahmed Chandio, Zhibin Yu, Feroz Shah Syed, Korejo Imtiaz Ali:
A Case Study on Job Scheduling Policy for Workload Characterization and Power Efficiency. - Marthe Bonamy, Benjamin Lévêque, Alexandre Pinlou:
Planar graphs with $Δ\geq 7$ and no triangle adjacent to a C4 are minimally edge and total choosable. - Moa Johansson, Dan Rosén, Nicholas Smallbone, Koen Claessen:
Hipster: Integrating Theory Exploration in a Proof Assistant. - Ugo Dal Lago, Claudia Faggian, Ichiro Hasuo, Akira Yoshimizu:
The Geometry of Synchronization (Long Version). - Ziaeddin Beheshtifard, Mohammad Reza Meybodi:
Online Channel Assignment in Multi-Radio Wireless Mesh Networks Using Learning Automata. - Cezary Kaliszyk, Josef Urban, Jirí Vyskocil, Herman Geuvers:
Developing Corpus-based Translation Methods between Informal and Formal Mathematics: Project Description. - Gang Mei:
A Straightforward Preprocessing Approach for Accelerating Convex Hull Computations on the GPU. - Fabián Riquelme:
Satisfaction in societies with opinion leaders and mediators: properties and an axiomatization. - Matthew England:
Formulating problems for real algebraic geometry. - Salvatore Cuomo, Raffaele Farina, Ardelio Galletti, Livia Marcellino:
An error estimate of Gaussian Recursive Filter in 3Dvar problem. - Ejder Bastug, Mehdi Bennis, Mérouane Debbah:
Cache-enabled Small Cell Networks: Modeling and Tradeoffs. - Zhizheng Zhang, Kaikai Zhao:
ESmodels: An Epistemic Specification Solver. - Petr Baudis:
COCOpf: An Algorithm Portfolio Framework. - Andrej Gajduk, Zoran Utkovski, Lasko Basnarkov, Ljupco Kocarev:
Energy-efficiency in Decentralized Wireless Networks: A Game-theoretic Approach inspired by Evolutionary Biology. - Petr Baudis:
Current Concepts in Version Control Systems. - Samah A. M. Ghanem, Munnujahan Ara:
Secure Data Transmission in Cooperative Modes: Relay and MAC. - Yoon Kim, Yi-I Chiu, Kentaro Hanaki, Darshan Hegde, Slav Petrov:
Temporal Analysis of Language through Neural Language Models. - Yoon Kim, Owen Zhang:
Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification. - Ken Chatfield, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman:
Return of the Devil in the Details: Delving Deep into Convolutional Nets. - Aline Parreau, Michel Rigo, Eric Rowland, Élise Vandomme:
A new approach to the $2$-regularity of the l-abelian complexity of 2-automatic sequences. - Tamal K. Dey, Fengtao Fan, Yusu Wang:
Dimension Detection with Local Homology. - Fionn Murtagh, Adam Ganz:
Pattern Recognition in Narrative: Analysis of Narratives of Emotion. - Mario Alviano, Carmine Dodaro, Francesco Ricca:
Anytime Computation of Cautious Consequences in Answer Set Programming. - Terrance Swift:
Incremental Tabling in Support of Knowledge Representation and Reasoning. - Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Andreea Picu:
Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization. - Flávio Cruz, Ricardo Rocha, Seth Copen Goldstein, Frank Pfenning:
A Linear Logic Programming Language for Concurrent Programming over Graph Structures. - Iaakov Exman, Gilad Amar, Ran Shaltiel:
The Interestingness Tool for Search in the Web. - Stefano Gogioso
:
Aspects of Statistical Physics in Computational Complexity. - Daniel Gall, Thom W. Frühwirth:
Exchanging Conflict Resolution in an Adaptable Implementation of ACT-R. - Marina I. Maslennikova:
Complexity of checking whether two automata are synchronized by the same language. - Vasiliy Usatyuk:
Application of lattice reduction block Korkin-Zolotarev method to MIMO-decoding. - Kyle Marple, Gopal Gupta:
Dynamic Consistency Checking in Goal-Directed Answer Set Programming. - Christian Antic:
On cascade products of answer set programs. - Nicholas Generous, Geoffrey Fairchild, Alina Deshpande, Sara Y. Del Valle, Reid Priedhorsky:
Detecting epidemics using Wikipedia article views: A demonstration of feasibility with language as location proxy. - Anh Le, Lorenzo Keller, Hulya Seferoglu, Blerim Cici, Christina Fragouli, Athina Markopoulou:
MicroCast: Cooperative Video Streaming using Cellular and D2D Connections. - Thomas Gransden, Neil Walkinshaw
, Rajeev Raman:
Mining State-Based Models from Proof Corpora. - Yury Polyanskiy, Yihong Wu:
Dissipation of information in channels with input constraints. - Kian Win Ong, Yannis Papakonstantinou, Romain Vernoux:
The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases. - Michael Gelfond, Yuanlin Zhang:
Vicious Circle Principle and Logic Programs with Aggregates. - Marco Comini, Laura Titolo, Alicia Villanueva:
Abstract Diagnosis for tccp using a Linear Temporal Logic. - Martin Gebser, Roland Kaminski, Benjamin Kaufmann, Torsten Schaub:
Clingo = ASP + Control: Preliminary Report. - Gauri Joshi, Yuval Kochman, Gregory W. Wornell:
Throughput-Smoothness Trade-offs in Multicasting of an Ordered Packet Stream. - Francesco Calimeri, Martin Gebser, Marco Maratea, Francesco Ricca:
The Design of the Fifth Answer Set Programming Competition. - Luís Moniz Pereira, Emmanuelle-Anna Dietz, Steffen Hölldobler:
Contextual Abductive Reasoning with Side-Effects. - Aftab Ahmed Chandio, Dingju Zhu, Ali Hassan Sodhro:
Integration of Inter-Connectivity of Information System (i3) using Web Services. - YuLong Zou, Jia Zhu, Xianbin Wang, Victor C. M. Leung:
Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques. - Xi Qiu, Christopher Stewart:
Topic words analysis based on LDA model. - Sweta Rai:
Student Dropout Risk Assessment in Undergraduate Course at Residential University. - Priyanka Saini:
Building a Classification Model for Enrollment In Higher Educational Courses using Data Mining Techniques. - Erik D. Demaine, Nathan Pinsker, Jon Schneider:
Fast Dynamic Pointer Following via Link-Cut Trees. - Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle X. Zhou, Jeffrey Nichols:
Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information. - Andrea Kohlhase:
Search Interfaces for Mathematicians. - Raphael Spreitzer:
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. - Yannis Haralambous, Julie Sauvage-Vincent, John Puentes:
INAUT, a Controlled Language for the French Coast Pilot Books Instructions nautiques. - Mohammad Gholami, Mehdi Samadieh:
Quasi Cyclic LDPC Codes Based on Finite Set Systems. - Domagoj Margan, Ana Mestrovic, Sanda Martincic-Ipsic:
Complex Networks Measures for Differentiation between Normal and Shuffled Croatian Texts. - Ana Sofia Gomes, José Júlio Alferes:
Transaction Logic with (Complex) Events. - Iulia Teodora Banu-Demergian, Gheorghe Stefanescu:
On contour representation of two dimensional patterns. - Angelos Charalambidis, Zoltán Ésik, Panos Rondogiannis:
Minimum Model Semantics for Extensional Higher-order Logic Programming with Negation. - Nada Sharaf, Slim Abdennadher, Thom W. Frühwirth:
Visualization of Constraint Handling Rules. - Grzegorz Jaskiewicz:
Logic Programming as Scripting Language for Bots in Computer Games - Research Overview. - Evanthia Papadopoulou, Maksym Zavershynskyi:
The Higher-Order Voronoi Diagram of Line Segments. - Lene M. Favrholdt, Jesper W. Mikkelsen:
Online Max-Edge-Coloring of Paths and Trees. - Marco Gavanelli, Stefano Bragaglia, Michela Milano, Federico Chesani, Elisa Marengo, Paolo Cagnoli:
Multi-Criteria Optimal Planning for Energy Policies in CLP. - Heike Stephan:
Application of Methods for Syntax Analysis of Context-Free Languages to Query Evaluation of Logic Programs. - Elad Hazan, Tomer Koren, Kfir Y. Levy:
Logistic Regression: Tight Bounds for Stochastic and Online Optimization. - Xu Chen, Jianwei Huang:
Spatial Spectrum Access Game. - Palash Dey, Neeldhara Misra, Y. Narahari:
Complexity of Kernelization in the Possible Winner Problem. - Max Jaderberg, Andrea Vedaldi, Andrew Zisserman:
Speeding up Convolutional Neural Networks with Low Rank Expansions. - Fayssal Bendaoud, Marwen Abdennebi, Fedoua Didi:
Allocation des ressources radio en LTE. - John P. Gallagher, Bishoksan Kafle:
Analysis and Transformation Tools for Constrained Horn Clause Verification. - Mário Abrantes, Luís Moniz Pereira:
Properties of Stable Model Semantics Extensions. - Xiang-Gen Xia, Tianxian Zhang, Lingjiang Kong:
MIMO OFDM Radar IRCI Free Range Reconstruction with Sufficient Cyclic Prefix. - Thibault Gauthier, Cezary Kaliszyk:
Matching concepts across HOL libraries. - Rahul A. Jichkar, M. B. Chandak:
An implementation on detection of trusted service provider in mobile ad-hoc networks. - Laurent Romary, Andreas Witt:
Méthodes pour la représentation informatisée de données lexicales / Methoden der Speicherung lexikalischer Daten. - Aadhityan A.:
A Novel Method for Developing Robotics via Artificial Intelligence and Internet of Things. - Kandeepan Sithamparanathan, Karina Mabell Gomez, Laurent Reynaud, Tinku Rasheed:
Aerial-Terrestrial Communications: Terrestrial Cooperation and Energy-Efficient Transmissions to Aerial-Base Stations. - Torbjörn Lager, Jan Wielemaker:
Pengines: Web Logic Programming Made Easy. - Zoran Majkic:
Saturation of the morphisms in the database category. - Elaheh Mohammadi, Farokh Marvasti:
Optimal Distortion of Non-Uniform Sampling. - Aya Saad
:
CDF-Intervals: A Reliable Framework to Reason about Data with Uncertainty. - Anurag Bhardwaj, Vignesh Jagadeesh, Wei Di, Robinson Piramuthu, Elizabeth F. Churchill:
Enhancing Visual Fashion Recommendations with Users in the Loop. - Stefan Brass:
A Framework for Bottom-Up Simulation of SLD-Resolution. - Ben Kimmett, Alex Thomo, S. Venkatesh:
Three-Way Joins on MapReduce: An Experimental Study. - Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:
SMT-based Model Checking for Recursive Programs. - Sanaz Khan Afshar, Vincent Aravantinos, Osman Hasan, Sofiène Tahar:
Formalization of Complex Vectors in Higher-Order Logic. - Ethan K. Jackson:
A Module System for Domain-Specific Languages. - Nicolás Guarín-Zapata
, Juan Gómez, Juan Jaramillo:
Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method. - (Withdrawn) An approximation algorithm for shortest path based on the hierarchy networks.
- Quoc V. Le, Tomás Mikolov:
Distributed Representations of Sentences and Documents. - Jianfeng Wang, Jingdong Wang, Jingkuan Song, Xin-Shun Xu, Heng Tao Shen, Shipeng Li:
Optimized Cartesian $K$-Means. - Stefano Ferretti:
On the Topology Maintenance of Dynamic P2P Overlays through Self-Healing Local Interactions. - Rukshan Alexander, Miroshan Alexander:
An ICT-Based Real-Time Surveillance System for Controlling Dengue in Sri Lanka. - Xuzhen Zhu, Hui Tian, Shi-Min Cai:
Personalized recommendation with corrected similarity. - Kristina Ban, Ivan Ivakic, Ana Mestrovic:
A preliminary study of Croatian Language Syllable Networks. - Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems. - Cristian Prisacariu:
Higher Dimensional Modal Logic. - Shikhar Kumar Gupta, Foram Joshi, Dixita Limbachiya, Manish K. Gupta:
3DNA: A Tool for DNA Sculpting. - Zoran Utkovski, Andrej Gajduk, Lasko Basnarkov, Darko Bosnakovski, Ljupco Kocarev:
On Energy-efficiency in Wireless Networks: A Game-theoretic Approach to Cooperation Inspired by Evolutionary Biology. - Enrico Paolini, Cedomir Stefanovic, Gianluigi Liva, Petar Popovski:
Coded Random Access: How Coding Theory Helps to Build Random Access Protocols. - Reza Azizi:
Empirical Study of Artificial Fish Swarm Algorithm. - Liang Chang, Uli Sattler, Tianlong Gu:
Algorithm for Adapting Cases Represented in a Tractable Description Logic. - Matthias Heizmann, Jochen Hoenicke, Andreas Podelski:
Termination Analysis by Learning Terminating Programs. - Parul Sharma, Anup Girdhar:
Security concerns of ipv6-slaac and security policies to diminish the risk associated with them. - Luca Bortolussi, Rytis Paskauskas:
Mean-Field approximation and Quasi-Equilibrium reduction of Markov Population Models. - Luisa F. Polanía, Rafael E. Carrillo, Manuel Blanco-Velasco, Kenneth E. Barner:
Exploiting Prior Knowledge in Compressed Sensing Wireless ECG Systems. - Joachim Jansen:
Model revision inference for extensions of first order logic. - Andrew Fish
, Alexei Lisitsa:
Detecting unknots via equational reasoning, I: Exploration. - Qizhi Zhang, Deping Liu:
On the hopping pattern design for D2D Discovery. - Leopoldo E. Bertossi, Babak Salimi:
Unifying Causality, Diagnosis, Repairs and View-Updates in Databases. - Sourangsu Banerji:
Architectural Design of a RAM Arbiter. - Yannis Haralambous:
Les mathématiques de la langue : l'approche formelle de Montague. - Alejandro Serrano, Pedro López-García, Manuel V. Hermenegildo:
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types. - Mina Taheri, Nirwan Ansari:
Multi-power-level Energy Saving Management for Passive Optical Networks. - Jan A. Botha, Phil Blunsom:
Compositional Morphology for Word Representations and Language Modelling. - Pratik P. Chaphekar:
Survey of Key Distribution Schemes for Wireless Sensor Networks. - Meizhu Liu, Le Lu, Xiaojing Ye, Shipeng Yu:
Coarse-to-Fine Classification via Parametric and Nonparametric Models for Computer-Aided Diagnosis. - David B. Knoester, Heather Goldsby, Christoph Adami:
Leveraging Evolutionary Search to Discover Self-Adaptive and Self-Organizing Cellular Automata. - Akshay Gadde, Aamir Anis, Antonio Ortega:
Active Semi-Supervised Learning Using Sampling Theory for Graph Signals. - Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Danilo Montesi, Payam Siyari, Matteo Magnani:
Diffusion Processes on Multilayer Networks. - Laura M. Smith, Linhong Zhu, Kristina Lerman
, Allon G. Percus:
Partitioning Networks with Node Attributes by Compressing Information Flow. - Hemant Kumar Saini, Satpal Singh Kushwaha, C. Rama Krishna:
Compressing the Data Densely by New Geflochtener to Accelerate Web. - Fei Tan, Yongxiang Xia, Boyao Zhu:
Link Prediction in Complex Networks: A Mutual Information Perspective. - Jin Tan, Dror Baron, Liyi Dai:
Wiener Filters in Gaussian Mixture Signal Estimation with Infinity-Norm Error. - Martin Haugh, Chun Wang:
Information Relaxations and Dynamic Zero-Sum Games. - Tomoyo Sasao, Shin'ichi Konomi, Masatoshi Arikawa, Hideyuki Fujita:
Touch Survey: Comparison with Paper and Web Questionnaires. - James Hegeman, Sriram V. Pemmaraju:
Lessons from the Congested Clique Applied to MapReduce. - Vijay Bhaskar Semwal, Shiv A. Katiyar, Pavan Chakraborty, Gora Chand Nandi:
Bipedal Model Based on Human Gait Pattern Parameters Bipedal Model Based on Human Gait Pattern Parameters for Sagittal Plane Movement. - Yannis Haralambous, Vitaly Klyuev:
Thematically Reinforced Explicit Semantic Analysis. - Yanjun Han, Huadong Meng, Yuan Shen, Xiao-Ping Zhang:
Performance Limits and Geometric Properties of Narrowband Array Localization. - Amaro Barreal, Camilla Hollanti, David A. Karpuk, Hsiao-feng Lu:
Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems. - Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato:
Area Coverage Under Low Sensor Density. - Tao Yang, Guoqiang Mao, Wei Zhang, Xiaofeng Tao:
Transport Capacity of Distributed Wireless CSMA Networks. - Shraddha Mehta, Vaishali Kalariya:
Efficient Tracking of a Moving Object using Inter-Frame Coding. - Shraddha Mehta, Vaishali Kalariya:
Real Time Object Tracking Based on Inter-frame Coding: A Review. - Sunny Mitra, Ritwik Mitra, Martin Riedl, Chris Biemann, Animesh Mukherjee, Pawan Goyal:
That's sick dude!: Automatic identification of word sense change across different timescales. - Michiel Stock, Thomas Fober, Eyke Hüllermeier, Serghei Glinca, Gerhard Klebe, Tapio Pahikkala
, Antti Airola, Bernard De Baets, Willem Waegeman:
Identification of functionally related enzymes by learning-to-rank methods. - Chang Li, Jun Zhang, Martin Haenggi, Khaled Ben Letaief:
User-Centric Intercell Interference Nulling for Downlink Small Cell Networks. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:
An Efficient Binary Technique for Trace Simplifications of Concurrent Programs. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:
Probabilistic Alias Analysis for Parallel Programming in SSA Forms. - Yi Wang, Xuemin Zhao, Zhenlong Sun, Hao Yan, Lifeng Wang, Zhihui Jin, Liubin Wang, Yang Gao, Jia Zeng, Qiang Yang, Ching Law:
Towards Topic Modeling for Big Data. - Jan Leike, Matthias Heizmann:
Geometric Series as Nontermination Arguments for Linear Lasso Programs. - Daniel Graziotin, Xiaofeng Wang, Pekka Abrahamsson:
Software developers, moods, emotions, and performance. - Tapio Pahikkala, Michiel Stock, Antti Airola, Tero Aittokallio, Bernard De Baets, Willem Waegeman:
A two-step learning approach for solving full and almost full cold start problems in dyadic prediction. - Jin Tan, Yanting Ma, Dror Baron:
Compressive Imaging via Approximate Message Passing with Image Denoising. - Domagoj Margan, Sanda Martincic-Ipsic, Ana Mestrovic:
Preliminary Report on the Structure of Croatian Linguistic Co-occurrence Networks. - Vijay Bhaskar Semwal, Gora Chand Nandi:
Study of Humanoid Push Recovery Based on Experiments. - Guido Carlo Ferrante, Jocelyn Fiorina, Maria-Gabriella Di Benedetto:
Robustness of Time Reversal vs. All-Rake Transceivers in Multiple Access Channels. - Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan:
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. - Justin Shi:
On The Reproducibility and Scalability of Extreme Scale Applications. - Ofer Dekel, Jian Ding, Tomer Koren, Yuval Peres:
Online Learning with Composite Loss Functions. - Holger Dell:
A simple proof that AND-compression of NP-complete problems is hard. - Olga Muñoz, Antonio Pascual-Iserte, Josep Vidal:
Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading. - Ulrike Brandt, Hermann K.-G. Walter:
Unsolvability Cores in Classification Problems. - Xiaojiang Peng, Limin Wang, Xingxing Wang, Yu Qiao:
Bag of Visual Words and Fusion Methods for Action Recognition: Comprehensive Study and Good Practice. - Tao Ye, Tao Wang, Zhipeng Lü, Jin-Kao Hao:
A Multi-parent Memetic Algorithm for the Linear Ordering Problem. - Tao Ye, Kan Zhou, Zhipeng Lü, Jin-Kao Hao:
A Memetic Algorithm for the Linear Ordering Problem with Cumulative Costs. - Siddhartha Sarma, Samar Agnihotri, Joy Kuri:
Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers. - Lakshmi Prabha S
, T. N. Janakiraman:
Polynomial-time Approximation Algorithm for finding Highly Comfortable Team in any given Social Network. - Baoxin Xiu, Changjun Fan, Meilian Liang:
On Disjoint Golomb Rulers. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:
A Distributed Algorithm for Training Nonlinear Kernel Machines. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:
A distributed block coordinate descent method for training $l_1$ regularized linear classifiers. - Michael Benedikt, Rastislav Lenhardt, James Worrell:
Model Checking Markov Chains Against Unambiguous Buchi Automata. - Neville Grech, Kyriakos Georgiou
, James Pallister, Steve Kerrison, Kerstin Eder
:
Static energy consumption analysis of LLVM IR programs. - Tong Peng, Rodrigo C. de Lamare:
Adaptive Delay-Tolerant Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems. - R. Joshua Tobin, Conor J. Houghton:
A Kernel-Based Calculation of Information on a Metric Space. - Kristjan H. Greenewald, Alfred O. Hero III:
Kronecker PCA Based Spatio-Temporal Modeling of Video for Dismount Classification. - Wei Feng, Jiaya Jia, Zhi-Qiang Liu:
ESSP: An Efficient Approach to Minimizing Dense and Nonsubmodular Energy Functions. - Chao Zhang, Hong-cen Mei, Hao Yang:
A Parallel Way to Select the Parameters of SVM Based on the Ant Optimization Algorithm. - Hu Xie, Da-Zheng Feng, Ming-Dong Yuan:
Fast Adaptive Beamforming based on kernel method under Small Sample Support. - Zhenyu Huang, Yao Sun, Dongdai Lin:
On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method. - Marjan Naderinejad, Mohammad Jafar Tarokh, Alireza Poorebrahimi:
Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital. - Dalei Wu, Haiqing Wu:
Modelling Data Dispersion Degree in Automatic Robust Estimation for Multivariate Gaussian Mixture Models with an Application to Noisy Speech Processing. - Razvan Pascanu, Yann N. Dauphin, Surya Ganguli, Yoshua Bengio:
On the saddle point problem for non-convex optimization. - Bernardo Gonçalves, Fábio Porto:
$Υ$-DB: Managing scientific hypotheses as uncertain data. - Junting Chen, Vincent K. N. Lau:
Two-Tier Precoding for FDD Multi-cell Massive MIMO Time-Varying Interference Networks (Full Version). - Wanneng Shu, Wei Wang, Yunji Wang:
A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. - Xiangyun Zhou:
Training-Based SWIPT: Optimal Power Splitting at the Receiver.