callback( { "result":{ "query":":facetid:toc:\"db/journals/corr/corr1310.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"252.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1206", "@dc":"1206", "@oc":"1206", "@id":"43444092", "text":":facetid:toc:db/journals/corr/corr1310.bht" } }, "hits":{ "@total":"1206", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"4251206", "info":{"authors":{"author":[{"@pid":"30/5289-1","text":"Laurent Doyen 0001"},{"@pid":"52/1845","text":"Thierry Massart"},{"@pid":"32/9219","text":"Mahsa Shirmohammadi"}]},"title":"Limit Synchronization in Markov Decision Processes.","venue":"CoRR","volume":"abs/1310.2935","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001MS13a","ee":"http://arxiv.org/abs/1310.2935","url":"https://dblp.org/rec/journals/corr/0001MS13a"}, "url":"URL#4251206" }, { "@score":"1", "@id":"4251210", "info":{"authors":{"author":[{"@pid":"62/5860-1","text":"Ping Li 0001"},{"@pid":"47/2704","text":"Cun-Hui Zhang"},{"@pid":"07/4227-1","text":"Tong Zhang 0001"}]},"title":"Compressed Counting Meets Compressed Sensing.","venue":"CoRR","volume":"abs/1310.1076","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001ZZ13","ee":"http://arxiv.org/abs/1310.1076","url":"https://dblp.org/rec/journals/corr/0001ZZ13"}, "url":"URL#4251210" }, { "@score":"1", "@id":"4251227", "info":{"authors":{"author":[{"@pid":"w/YangWang20","text":"Yang Wang 0020"},{"@pid":"72/51","text":"Zhiqiang Xu"}]},"title":"Phase Retrieval for Sparse Signals.","venue":"CoRR","volume":"abs/1310.0873","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/0020X13","ee":"http://arxiv.org/abs/1310.0873","url":"https://dblp.org/rec/journals/corr/0020X13"}, "url":"URL#4251227" }, { "@score":"1", "@id":"4251236", "info":{"authors":{"author":[{"@pid":"52/3176","text":"Aharon Abadi"},{"@pid":"57/6550","text":"Yael Dubinsky"},{"@pid":"29/3111","text":"Andrei Kirshin"},{"@pid":"94/8422","text":"Yossi Mesika"},{"@pid":"87/8297","text":"Idan Ben-Harrush"}]},"title":"Codeless Screen-Oriented Programming for Enterprise Mobile Applications.","venue":"CoRR","volume":"abs/1310.1506","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbadiDKMB13","ee":"http://arxiv.org/abs/1310.1506","url":"https://dblp.org/rec/journals/corr/AbadiDKMB13"}, "url":"URL#4251236" }, { "@score":"1", "@id":"4251239", "info":{"authors":{"author":[{"@pid":"136/5607","text":"Nidhal Khdhair El Abbadi"},{"@pid":"136/5889","text":"Enas Hamood Al Saadi"}]},"title":"Improvement of Automatic Hemorrhages Detection Methods Using Shapes Recognition.","venue":"CoRR","volume":"abs/1310.5999","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbbadiS13","ee":"http://arxiv.org/abs/1310.5999","url":"https://dblp.org/rec/journals/corr/AbbadiS13"}, "url":"URL#4251239" }, { "@score":"1", "@id":"4251247", "info":{"authors":{"author":[{"@pid":"136/5651","text":"Ayman T. Abdel-Hamid"},{"@pid":"75/1656","text":"Ahmed H. Zahran"},{"@pid":"23/553","text":"Tamer A. ElBatt"}]},"title":"Improved Spectrum Mobility using Virtual Reservation in Collaborative Cognitive Radio Networks.","venue":"CoRR","volume":"abs/1310.2954","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Abdel-HamidZE13","ee":"http://arxiv.org/abs/1310.2954","url":"https://dblp.org/rec/journals/corr/Abdel-HamidZE13"}, "url":"URL#4251247" }, { "@score":"1", "@id":"4251291", "info":{"authors":{"author":[{"@pid":"129/1543","text":"Romain Absil"},{"@pid":"m/HadrienMelot","text":"Hadrien Mélot"}]},"title":"On price of symmetrisation.","venue":"CoRR","volume":"abs/1310.2775","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbsilM13","ee":"http://arxiv.org/abs/1310.2775","url":"https://dblp.org/rec/journals/corr/AbsilM13"}, "url":"URL#4251291" }, { "@score":"1", "@id":"4251294", "info":{"authors":{"author":[{"@pid":"44/3421","text":"Umut A. Acar"},{"@pid":"a/AmalAhmed","text":"Amal Ahmed 0001"},{"@pid":"96/3253","text":"James Cheney"},{"@pid":"27/2651","text":"Roly Perera"}]},"title":"A Core Calculus for Provenance.","venue":"CoRR","volume":"abs/1310.6299","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AcarACP13","ee":"http://arxiv.org/abs/1310.6299","url":"https://dblp.org/rec/journals/corr/AcarACP13"}, "url":"URL#4251294" }, { "@score":"1", "@id":"4251314", "info":{"authors":{"author":[{"@pid":"55/8317","text":"Marek Adamczyk"},{"@pid":"s/MaximSviridenko","text":"Maxim Sviridenko"},{"@pid":"92/535","text":"Justin Ward"}]},"title":"Submodular Stochastic Probing on Matroids.","venue":"CoRR","volume":"abs/1310.4415","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdamczykSW13","ee":"http://arxiv.org/abs/1310.4415","url":"https://dblp.org/rec/journals/corr/AdamczykSW13"}, "url":"URL#4251314" }, { "@score":"1", "@id":"4251315", "info":{"authors":{"author":[{"@pid":"136/5684","text":"Toni Adame"},{"@pid":"52/7532","text":"Albert Bel"},{"@pid":"35/6267","text":"Boris Bellalta"},{"@pid":"25/4159","text":"Jaume Barceló"},{"@pid":"366/8011","text":"Javier Gonzalez"},{"@pid":"87/4550","text":"Miquel Oliver"}]},"title":"Capacity Analysis of IEEE 802.11ah WLANs for M2M Communications.","venue":"CoRR","volume":"abs/1310.6880","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdameBBBGO13","ee":"http://arxiv.org/abs/1310.6880","url":"https://dblp.org/rec/journals/corr/AdameBBBGO13"}, "url":"URL#4251315" }, { "@score":"1", "@id":"4251318", "info":{"authors":{"author":[{"@pid":"24/8317","text":"Ben Adcock"},{"@pid":"02/8316","text":"Anders C. Hansen"},{"@pid":"72/1336","text":"Bogdan Roman"},{"@pid":"70/5596","text":"Gerd Teschke"}]},"title":"Generalized sampling: stable reconstructions, inverse problems and compressed sensing over the continuum.","venue":"CoRR","volume":"abs/1310.1141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdcockHRT13","ee":"http://arxiv.org/abs/1310.1141","url":"https://dblp.org/rec/journals/corr/AdcockHRT13"}, "url":"URL#4251318" }, { "@score":"1", "@id":"4251325", "info":{"authors":{"author":[{"@pid":"136/5728","text":"Kalpesh Adhatrao"},{"@pid":"136/5790","text":"Aditya Gaykar"},{"@pid":"136/6028","text":"Amiraj Dhawan"},{"@pid":"136/6066","text":"Rohit Jha"},{"@pid":"136/6163","text":"Vipul Honrao"}]},"title":"Predicting Students' Performance Using ID3 And C4.5 Classification Algorithms.","venue":"CoRR","volume":"abs/1310.2071","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdhatraoGDJH13","ee":"http://arxiv.org/abs/1310.2071","url":"https://dblp.org/rec/journals/corr/AdhatraoGDJH13"}, "url":"URL#4251325" }, { "@score":"1", "@id":"4251326", "info":{"authors":{"author":[{"@pid":"136/5728","text":"Kalpesh Adhatrao"},{"@pid":"136/5790","text":"Aditya Gaykar"},{"@pid":"136/6066","text":"Rohit Jha"},{"@pid":"136/6163","text":"Vipul Honrao"}]},"title":"A Secure Method for Signing in Using Quick Response Codes with Mobile Authentication.","venue":"CoRR","volume":"abs/1310.4000","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdhatraoGJH13","ee":"http://arxiv.org/abs/1310.4000","url":"https://dblp.org/rec/journals/corr/AdhatraoGJH13"}, "url":"URL#4251326" }, { "@score":"1", "@id":"4251332", "info":{"authors":{"author":[{"@pid":"25/6549","text":"Isolde Adler"},{"@pid":"85/4090","text":"Stavros G. Kolliopoulos"},{"@pid":"36/7988","text":"Philipp Klaus Krause"},{"@pid":"78/67","text":"Daniel Lokshtanov"},{"@pid":"11/5491","text":"Saket Saurabh 0001"},{"@pid":"t/DimitriosMThilikos","text":"Dimitrios M. Thilikos"}]},"title":"Irrelevant Vertices for the Planar Disjoint Paths Problem.","venue":"CoRR","volume":"abs/1310.2378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdlerKKLST13","ee":"http://arxiv.org/abs/1310.2378","url":"https://dblp.org/rec/journals/corr/AdlerKKLST13"}, "url":"URL#4251332" }, { "@score":"1", "@id":"4251333", "info":{"authors":{"author":[{"@pid":"07/9552","text":"Danko Adrovic"},{"@pid":"49/4497","text":"Jan Verschelde"}]},"title":"A Polyhedral Method to Compute All Affine Solution Sets of Sparse Polynomial Systems.","venue":"CoRR","volume":"abs/1310.4128","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdrovicV13","ee":"http://arxiv.org/abs/1310.4128","url":"https://dblp.org/rec/journals/corr/AdrovicV13"}, "url":"URL#4251333" }, { "@score":"1", "@id":"4251338", "info":{"authors":{"author":{"@pid":"136/5862","text":"Eldad Afik"}},"title":"Robust and highly performant ring detection algorithm for 3d particle tracking using 2d microscope imaging.","venue":"CoRR","volume":"abs/1310.1371","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Afik13","ee":"http://arxiv.org/abs/1310.1371","url":"https://dblp.org/rec/journals/corr/Afik13"}, "url":"URL#4251338" }, { "@score":"1", "@id":"4251342", "info":{"authors":{"author":{"@pid":"17/10696","text":"Mohammad Mehdi Afsar"}},"title":"Effective Data Aggregation using a Hierarchical Multi-layered Scheme for Large-scale Sensor Networks.","venue":"CoRR","volume":"abs/1310.8591","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Afsar13","ee":"http://arxiv.org/abs/1310.8591","url":"https://dblp.org/rec/journals/corr/Afsar13"}, "url":"URL#4251342" }, { "@score":"1", "@id":"4251345", "info":{"authors":{"author":[{"@pid":"136/6080","text":"Muhammad Umar Aftab"},{"@pid":"136/5938","text":"Amna Nisar"},{"@pid":"136/6149","text":"Asif"},{"@pid":"77/5953","text":"Adeel Ashraf"},{"@pid":"136/5950","text":"Burhan Gill"}]},"title":"RBAC Architecture Design Issues in Institutions Collaborative Environment.","venue":"CoRR","volume":"abs/1310.5962","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AftabNAAG13","ee":"http://arxiv.org/abs/1310.5962","url":"https://dblp.org/rec/journals/corr/AftabNAAG13"}, "url":"URL#4251345" }, { "@score":"1", "@id":"4251346", "info":{"authors":{"author":[{"@pid":"24/4383","text":"Alekh Agarwal"},{"@pid":"25/1529","text":"Animashree Anandkumar"},{"@pid":"32/465-2","text":"Prateek Jain 0002"},{"@pid":"54/8775","text":"Praneeth Netrapalli"},{"@pid":"135/4992","text":"Rashish Tandon"}]},"title":"Learning Sparsely Used Overcomplete Dictionaries via Alternating Minimization.","venue":"CoRR","volume":"abs/1310.7991","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalA0NT13","ee":"http://arxiv.org/abs/1310.7991","url":"https://dblp.org/rec/journals/corr/AgarwalA0NT13"}, "url":"URL#4251346" }, { "@score":"1", "@id":"4251348", "info":{"authors":{"author":[{"@pid":"24/4383","text":"Alekh Agarwal"},{"@pid":"30/1046","text":"Léon Bottou"},{"@pid":"30/2146","text":"Miroslav Dudík"},{"@pid":"77/4488","text":"John Langford 0001"}]},"title":"Para-active learning.","venue":"CoRR","volume":"abs/1310.8243","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalBDL13","ee":"http://arxiv.org/abs/1310.8243","url":"https://dblp.org/rec/journals/corr/AgarwalBDL13"}, "url":"URL#4251348" }, { "@score":"1", "@id":"4251350", "info":{"authors":{"author":[{"@pid":"a/PankajKAgarwal","text":"Pankaj K. Agarwal"},{"@pid":"h/SarielHarPeled","text":"Sariel Har-Peled"},{"@pid":"48/3950","text":"Haim Kaplan"},{"@pid":"s/MichaSharir","text":"Micha Sharir"}]},"title":"Union of Random Minkowski Sums and Network Vulnerability Analysis.","venue":"CoRR","volume":"abs/1310.5647","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalHKS13","ee":"http://arxiv.org/abs/1310.5647","url":"https://dblp.org/rec/journals/corr/AgarwalHKS13"}, "url":"URL#4251350" }, { "@score":"1", "@id":"4251352", "info":{"authors":{"author":[{"@pid":"24/4383","text":"Alekh Agarwal"},{"@pid":"s/SMKakade","text":"Sham M. Kakade"},{"@pid":"91/8774","text":"Nikos Karampatziakis"},{"@pid":"94/3481","text":"Le Song"},{"@pid":"80/6006","text":"Gregory Valiant"}]},"title":"Least Squares Revisited: Scalable Approaches for Multi-class Prediction.","venue":"CoRR","volume":"abs/1310.1949","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalKKSV13","ee":"http://arxiv.org/abs/1310.1949","url":"https://dblp.org/rec/journals/corr/AgarwalKKSV13"}, "url":"URL#4251352" }, { "@score":"1", "@id":"4251362", "info":{"authors":{"author":[{"@pid":"136/5906","text":"Vidit Agrawal"},{"@pid":"136/5875","text":"Shivpal Singh Kang"},{"@pid":"29/5707","text":"Sudeshna Sinha"}]},"title":"Realization of Morphing Logic Gates in a Repressilator with Quorum Sensing Feedback.","venue":"CoRR","volume":"abs/1310.8267","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgrawalKS13","ee":"http://arxiv.org/abs/1310.8267","url":"https://dblp.org/rec/journals/corr/AgrawalKS13"}, "url":"URL#4251362" }, { "@score":"1", "@id":"4251365", "info":{"authors":{"author":[{"@pid":"17/5121","text":"Stefano Aguzzoli"},{"@pid":"11/2686","text":"Vincenzo Marra"}]},"title":"Two principles in many-valued logic.","venue":"CoRR","volume":"abs/1310.2346","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AguzzoliM13","ee":"http://arxiv.org/abs/1310.2346","url":"https://dblp.org/rec/journals/corr/AguzzoliM13"}, "url":"URL#4251365" }, { "@score":"1", "@id":"4251369", "info":{"authors":{"author":[{"@pid":"42/5385","text":"Dorit Aharonov"},{"@pid":"57/6222","text":"Lior Eldar"}]},"title":"Quantum Locally Testable Codes.","venue":"CoRR","volume":"abs/1310.5664","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AharonovE13","ee":"http://arxiv.org/abs/1310.5664","url":"https://dblp.org/rec/journals/corr/AharonovE13"}, "url":"URL#4251369" }, { "@score":"1", "@id":"4251396", "info":{"authors":{"author":[{"@pid":"33/289","text":"Oswin Aichholzer"},{"@pid":"84/5781","text":"Thomas Hackl"},{"@pid":"136/5896","text":"Sarah Lutteropp"},{"@pid":"32/4396","text":"Tamara Mchedlidze"},{"@pid":"29/7186","text":"Alexander Pilz"},{"@pid":"95/3225","text":"Birgit Vogtenhuber"}]},"title":"Monotone Simultaneous Embedding of Directed Paths.","venue":"CoRR","volume":"abs/1310.6955","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AichholzerHLMPV13","ee":"http://arxiv.org/abs/1310.6955","url":"https://dblp.org/rec/journals/corr/AichholzerHLMPV13"}, "url":"URL#4251396" }, { "@score":"1", "@id":"4251397", "info":{"authors":{"author":[{"@pid":"33/289","text":"Oswin Aichholzer"},{"@pid":"84/5781","text":"Thomas Hackl"},{"@pid":"48/2358","text":"David Orden"},{"@pid":"29/7186","text":"Alexander Pilz"},{"@pid":"13/7864","text":"Maria Saumell"},{"@pid":"95/3225","text":"Birgit Vogtenhuber"}]},"title":"Flips in combinatorial pointed pseudo-triangulations with face degree at most four.","venue":"CoRR","volume":"abs/1310.0833","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AichholzerHOPSV13","ee":"http://arxiv.org/abs/1310.0833","url":"https://dblp.org/rec/journals/corr/AichholzerHOPSV13"}, "url":"URL#4251397" }, { "@score":"1", "@id":"4251407", "info":{"authors":{"author":[{"@pid":"02/4471","text":"Mehmet Akçakaya"},{"@pid":"15/2026","text":"Vahid Tarokh"}]},"title":"New Conditions for Sparse Phase Retrieval.","venue":"CoRR","volume":"abs/1310.1351","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AkcakayaT13","ee":"http://arxiv.org/abs/1310.1351","url":"https://dblp.org/rec/journals/corr/AkcakayaT13"}, "url":"URL#4251407" }, { "@score":"1", "@id":"4251418", "info":{"authors":{"author":[{"@pid":"57/1469","text":"Tatsuya Akutsu"},{"@pid":"07/638","text":"Takeyuki Tamura"},{"@pid":"35/2213","text":"Atsuhiro Takasu"}]},"title":"On the Parameterized Complexity of Associative and Commutative Unification.","venue":"CoRR","volume":"abs/1310.0919","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AkutsuTT13","ee":"http://arxiv.org/abs/1310.0919","url":"https://dblp.org/rec/journals/corr/AkutsuTT13"}, "url":"URL#4251418" }, { "@score":"1", "@id":"4251446", "info":{"authors":{"author":[{"@pid":"54/9669","text":"Rodrigo Aldecoa"},{"@pid":"94/4171","text":"Ignacio Marín 0001"}]},"title":"SurpriseMe: an integrated tool for network community structure characterization using Surprise maximization.","venue":"CoRR","volume":"abs/1310.2357","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AldecoaM13a","ee":"http://arxiv.org/abs/1310.2357","url":"https://dblp.org/rec/journals/corr/AldecoaM13a"}, "url":"URL#4251446" }, { "@score":"1", "@id":"4251460", "info":{"authors":{"author":[{"@pid":"136/6127","text":"Mohammad Alhawarat"},{"@pid":"59/9262","text":"Waleed Nazih"},{"@pid":"136/5624","text":"Mohammad Eldesouki"}]},"title":"Studying a Chaotic Spiking Neural Model.","venue":"CoRR","volume":"abs/1310.7115","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlhawaratNE13","ee":"http://arxiv.org/abs/1310.7115","url":"https://dblp.org/rec/journals/corr/AlhawaratNE13"}, "url":"URL#4251460" }, { "@score":"1", "@id":"4251464", "info":{"authors":{"author":[{"@pid":"41/7252","text":"Omar Ali"},{"@pid":"136/5652","text":"Mahmoud F. Ayoub"},{"@pid":"52/727","text":"Moustafa Youssef 0001"}]},"title":"Practical Provably Secure Multi-node Communication.","venue":"CoRR","volume":"abs/1310.4859","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AliAY13","ee":"http://arxiv.org/abs/1310.4859","url":"https://dblp.org/rec/journals/corr/AliAY13"}, "url":"URL#4251464" }, { "@score":"1", "@id":"4251466", "info":{"authors":{"author":[{"@pid":"136/5834","text":"Syed Asif Ali"},{"@pid":"01/3386","text":"Safeeullah Soomro"},{"@pid":"135/6153","text":"Abdul Ghafoor Memon"},{"@pid":"136/5985","text":"Mashooque Ahmed"}]},"title":"Interactive Employment Model to Assimilate the Deaf persons in workplace by using ICT.","venue":"CoRR","volume":"abs/1310.5472","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AliSMA13","ee":"http://arxiv.org/abs/1310.5472","url":"https://dblp.org/rec/journals/corr/AliSMA13"}, "url":"URL#4251466" }, { "@score":"1", "@id":"4251467", "info":{"authors":{"author":[{"@pid":"136/5834","text":"Syed Asif Ali"},{"@pid":"01/3386","text":"Safeeullah Soomro"},{"@pid":"135/6153","text":"Abdul Ghafoor Memon"},{"@pid":"25/8343","text":"Abdul Baqi"}]},"title":"Implementation of Automata Theory to Improve the Learning Disability.","venue":"CoRR","volume":"abs/1310.5474","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AliSMB13","ee":"http://arxiv.org/abs/1310.5474","url":"https://dblp.org/rec/journals/corr/AliSMB13"}, "url":"URL#4251467" }, { "@score":"1", "@id":"4251473", "info":{"authors":{"author":[{"@pid":"125/2217","text":"Christian M. Alis"},{"@pid":"125/2014","text":"May T. Lim"}]},"title":"Spatio-temporal variation of conversational utterances on Twitter.","venue":"CoRR","volume":"abs/1310.2479","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlisL13","ee":"http://arxiv.org/abs/1310.2479","url":"https://dblp.org/rec/journals/corr/AlisL13"}, "url":"URL#4251473" }, { "@score":"1", "@id":"4251475", "info":{"authors":{"author":[{"@pid":"55/9876","text":"Mahnoosh Alizadeh"},{"@pid":"92/55","text":"Yuanzhang Xiao"},{"@pid":"61/1706","text":"Anna Scaglione"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"Incentive Design for Direct Load Control Programs.","venue":"CoRR","volume":"abs/1310.0402","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlizadehXSS13","ee":"http://arxiv.org/abs/1310.0402","url":"https://dblp.org/rec/journals/corr/AlizadehXSS13"}, "url":"URL#4251475" }, { "@score":"1", "@id":"4251482", "info":{"authors":{"author":[{"@pid":"119/4870","text":"Sarah R. Allen"},{"@pid":"h/LisaHellerstein","text":"Lisa Hellerstein"},{"@pid":"75/9827","text":"Devorah Kletenik"},{"@pid":"26/2397","text":"Tonguç Ünlüyurt"}]},"title":"Evaluation of DNF Formulas.","venue":"CoRR","volume":"abs/1310.3673","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AllenHKU13","ee":"http://arxiv.org/abs/1310.3673","url":"https://dblp.org/rec/journals/corr/AllenHKU13"}, "url":"URL#4251482" }, { "@score":"1", "@id":"4251483", "info":{"authors":{"author":[{"@pid":"97/2594","text":"Madjid Allili"},{"@pid":"37/4684","text":"Tomasz Kaczynski"},{"@pid":"96/1001","text":"Claudia Landi 0001"}]},"title":"Reducing complexes in multidimensional persistent homology theory.","venue":"CoRR","volume":"abs/1310.8089","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlliliKL13","ee":"http://arxiv.org/abs/1310.8089","url":"https://dblp.org/rec/journals/corr/AlliliKL13"}, "url":"URL#4251483" }, { "@score":"1", "@id":"4251513", "info":{"authors":{"author":[{"@pid":"67/1810","text":"Alex Alvarado"},{"@pid":"92/6506","text":"Erik Agrell"}]},"title":"Achievable Rates for Four-Dimensional Coded Modulation with a Bit-Wise Receiver.","venue":"CoRR","volume":"abs/1310.4149","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlvaradoA13","ee":"http://arxiv.org/abs/1310.4149","url":"https://dblp.org/rec/journals/corr/AlvaradoA13"}, "url":"URL#4251513" }, { "@score":"1", "@id":"4251515", "info":{"authors":{"author":[{"@pid":"48/9671","text":"Sandra Álvarez-García"},{"@pid":"b/NievesRBrisaboa","text":"Nieves R. Brisaboa"},{"@pid":"47/4207","text":"Javier D. Fernández"},{"@pid":"84/3901","text":"Miguel A. Martínez-Prieto"},{"@pid":"n/GonzaloNavarro","text":"Gonzalo Navarro 0001"}]},"title":"Compressed Vertical Partitioning for Full-In-Memory RDF Management.","venue":"CoRR","volume":"abs/1310.4954","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Alvarez-GarciaBFMN13","ee":"http://arxiv.org/abs/1310.4954","url":"https://dblp.org/rec/journals/corr/Alvarez-GarciaBFMN13"}, "url":"URL#4251515" }, { "@score":"1", "@id":"4251523", "info":{"authors":{"author":[{"@pid":"134/3063","text":"Heba Aly"},{"@pid":"52/727","text":"Moustafa Youssef 0001"}]},"title":"Dejavu: An Accurate Energy-Efficient Outdoor Localization System.","venue":"CoRR","volume":"abs/1310.2342","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlyY13","ee":"http://arxiv.org/abs/1310.2342","url":"https://dblp.org/rec/journals/corr/AlyY13"}, "url":"URL#4251523" }, { "@score":"1", "@id":"4251534", "info":{"authors":{"author":{"@pid":"56/8910","text":"Maxime Amblard"}},"title":"Treating clitics with minimalist grammars.","venue":"CoRR","volume":"abs/1310.2527","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Amblard13","ee":"http://arxiv.org/abs/1310.2527","url":"https://dblp.org/rec/journals/corr/Amblard13"}, "url":"URL#4251534" }, { "@score":"1", "@id":"4251550", "info":{"authors":{"author":{"@pid":"96/1826","text":"Boulbaba Ben Ammar"}},"title":"Neural perceptual model to global-local vision for recognition of the logical structure of administrative documents.","venue":"CoRR","volume":"abs/1310.7440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ammar13","ee":"http://arxiv.org/abs/1310.7440","url":"https://dblp.org/rec/journals/corr/Ammar13"}, "url":"URL#4251550" }, { "@score":"1", "@id":"4251551", "info":{"authors":{"author":[{"@pid":"63/6711","text":"Habib Ammari"},{"@pid":"61/3978","text":"Stéphane Mallat"},{"@pid":"136/6043","text":"Irène Waldspurger"},{"@pid":"67/1771","text":"Han Wang"}]},"title":"Wavelet methods for shape perception in electro-sensing.","venue":"CoRR","volume":"abs/1310.2842","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmmariMWW13","ee":"http://arxiv.org/abs/1310.2842","url":"https://dblp.org/rec/journals/corr/AmmariMWW13"}, "url":"URL#4251551" }, { "@score":"1", "@id":"4251572", "info":{"authors":{"author":[{"@pid":"125/2944","text":"Gabrielle Anderson"},{"@pid":"44/1578","text":"Matthew Collinson"},{"@pid":"16/3107","text":"David J. Pym"}]},"title":"Utility-based Decision-making in Distributed Systems Modelling.","venue":"CoRR","volume":"abs/1310.6405","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndersonCP13","ee":"http://arxiv.org/abs/1310.6405","url":"https://dblp.org/rec/journals/corr/AndersonCP13"}, "url":"URL#4251572" }, { "@score":"1", "@id":"4251573", "info":{"authors":{"author":[{"@pid":"38/4483-4","text":"Eric Anderson 0004"},{"@pid":"85/9349","text":"Sihan Li"},{"@pid":"x/TaoXie","text":"Tao Xie 0001"}]},"title":"A Preliminary Field Study of Game Programming on Mobile Devices.","venue":"CoRR","volume":"abs/1310.3308","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndersonLX13","ee":"http://arxiv.org/abs/1310.3308","url":"https://dblp.org/rec/journals/corr/AndersonLX13"}, "url":"URL#4251573" }, { "@score":"1", "@id":"4251574", "info":{"authors":{"author":[{"@pid":"66/6009","text":"Alexandr Andoni"},{"@pid":"27/2931","text":"Anupam Gupta 0001"},{"@pid":"k/RobertKrauthgamer","text":"Robert Krauthgamer"}]},"title":"Towards (1+ε)-Approximate Flow Sparsifiers.","venue":"CoRR","volume":"abs/1310.3252","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndoniGK13","ee":"http://arxiv.org/abs/1310.3252","url":"https://dblp.org/rec/journals/corr/AndoniGK13"}, "url":"URL#4251574" }, { "@score":"1", "@id":"4251578", "info":{"authors":{"author":[{"@pid":"97/8355","text":"Martin Andreasson"},{"@pid":"10/1107","text":"Dimos V. Dimarogonas"},{"@pid":"50/2611","text":"Henrik Sandberg"},{"@pid":"81/3323","text":"Karl Henrik Johansson"}]},"title":"Distributed Control of Networked Dynamical Systems: Static Feedback, Integral Action and Consensus.","venue":"CoRR","volume":"abs/1310.8620","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndreassonDSJ13","ee":"http://arxiv.org/abs/1310.8620","url":"https://dblp.org/rec/journals/corr/AndreassonDSJ13"}, "url":"URL#4251578" }, { "@score":"1", "@id":"4251592", "info":{"authors":{"author":[{"@pid":"a/FabrizioAngiulli","text":"Fabrizio Angiulli"},{"@pid":"b/RachelBenEliyahuZohary","text":"Rachel Ben-Eliyahu-Zohary"},{"@pid":"90/3977","text":"Fabio Fassetti"},{"@pid":"p/LuigiPalopoli","text":"Luigi Palopoli 0001"}]},"title":"On the Tractability of Minimal Model Computation for Some CNF Theories.","venue":"CoRR","volume":"abs/1310.8120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AngiulliBFP13","ee":"http://arxiv.org/abs/1310.8120","url":"https://dblp.org/rec/journals/corr/AngiulliBFP13"}, "url":"URL#4251592" }, { "@score":"1", "@id":"4251611", "info":{"authors":{"author":[{"@pid":"a/LuisAntunes2","text":"Luis Filipe Coelho Antunes"},{"@pid":"98/2804","text":"Andre Souto"},{"@pid":"v/PMBVitanyi","text":"Paul M. B. Vitányi"}]},"title":"On Logical Depth and the Running Time of Shortest Programs.","venue":"CoRR","volume":"abs/1310.6976","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AntunesSV13","ee":"http://arxiv.org/abs/1310.6976","url":"https://dblp.org/rec/journals/corr/AntunesSV13"}, "url":"URL#4251611" }, { "@score":"1", "@id":"4251618", "info":{"authors":{"author":[{"@pid":"99/1403","text":"Itai Arad"},{"@pid":"21/7589","text":"Or Sattath"}]},"title":"A Constructive Quantum Lovász Local Lemma for Commuting Projectors.","venue":"CoRR","volume":"abs/1310.7766","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AradS13","ee":"http://arxiv.org/abs/1310.7766","url":"https://dblp.org/rec/journals/corr/AradS13"}, "url":"URL#4251618" }, { "@score":"1", "@id":"4251632", "info":{"authors":{"author":[{"@pid":"145/6697","text":"Eduardo B. Araújo"},{"@pid":"00/11468","text":"André A. Moreira"},{"@pid":"17/2960","text":"Vasco Furtado"},{"@pid":"69/3857","text":"Tarcisio H. C. Pequeno"},{"@pid":"92/5186","text":"José S. Andrade Jr."}]},"title":"Collaboration networks from a large CV database: dynamics, topology and bonus impact.","venue":"CoRR","volume":"abs/1310.1366","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AraujoMFPJ13","ee":"http://arxiv.org/abs/1310.1366","url":"https://dblp.org/rec/journals/corr/AraujoMFPJ13"}, "url":"URL#4251632" }, { "@score":"1", "@id":"4251643", "info":{"authors":{"author":[{"@pid":"06/1862","text":"Jerónimo Arenas-García"},{"@pid":"68/4463","text":"Kaare Brandt Petersen"},{"@pid":"32/5293","text":"Gustavo Camps-Valls"},{"@pid":"80/3468","text":"Lars Kai Hansen"}]},"title":"Kernel Multivariate Analysis Framework for Supervised Subspace Learning: A Tutorial on Linear and Kernel Multivariate Methods.","venue":"CoRR","volume":"abs/1310.5089","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arenas-GarciaPCH13","ee":"http://arxiv.org/abs/1310.5089","url":"https://dblp.org/rec/journals/corr/Arenas-GarciaPCH13"}, "url":"URL#4251643" }, { "@score":"1", "@id":"4251652", "info":{"authors":{"author":[{"@pid":"a/BAronov","text":"Boris Aronov"},{"@pid":"136/6026","text":"Mark V. Yagnatinsky"}]},"title":"How To Place a Point to Maximize Angles.","venue":"CoRR","volume":"abs/1310.6413","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AronovY13","ee":"http://arxiv.org/abs/1310.6413","url":"https://dblp.org/rec/journals/corr/AronovY13"}, "url":"URL#4251652" }, { "@score":"1", "@id":"4251654", "info":{"authors":{"author":[{"@pid":"a/SArora","text":"Sanjeev Arora"},{"@pid":"47/7801","text":"Aditya Bhaskara"},{"@pid":"89/6869-1","text":"Rong Ge 0001"},{"@pid":"54/9061","text":"Tengyu Ma 0001"}]},"title":"Provable Bounds for Learning Some Deep Representations.","venue":"CoRR","volume":"abs/1310.6343","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AroraBGM13","ee":"http://arxiv.org/abs/1310.6343","url":"https://dblp.org/rec/journals/corr/AroraBGM13"}, "url":"URL#4251654" }, { "@score":"1", "@id":"4251661", "info":{"authors":{"author":[{"@pid":"09/11495","text":"Ömür Arslan"},{"@pid":"58/3787","text":"Dan P. Guralnik"},{"@pid":"33/4989","text":"Daniel E. Koditschek"}]},"title":"Discriminative Measures for Comparison of Phylogenetic Trees.","venue":"CoRR","volume":"abs/1310.5202","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArslanGK13","ee":"http://arxiv.org/abs/1310.5202","url":"https://dblp.org/rec/journals/corr/ArslanGK13"}, "url":"URL#4251661" }, { "@score":"1", "@id":"4251669", "info":{"authors":{"author":[{"@pid":"159/8588","text":"Srinivasan Arunachalam"},{"@pid":"15/11144","text":"Abel Molina"},{"@pid":"138/8825","text":"Vincent Russo"}]},"title":"Quantum hedging in two-round prover-verifier interactions.","venue":"CoRR","volume":"abs/1310.7954","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArunachalamMR13","ee":"http://arxiv.org/abs/1310.7954","url":"https://dblp.org/rec/journals/corr/ArunachalamMR13"}, "url":"URL#4251669" }, { "@score":"1", "@id":"4251672", "info":{"authors":{"author":[{"@pid":"57/8044","text":"Arash Asadi"},{"@pid":"97/6505-7","text":"Qing Wang 0007"},{"@pid":"46/1660","text":"Vincenzo Mancuso"}]},"title":"A Survey on Device-to-Device Communication in Cellular Networks.","venue":"CoRR","volume":"abs/1310.0720","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AsadiWM13","ee":"http://arxiv.org/abs/1310.0720","url":"https://dblp.org/rec/journals/corr/AsadiWM13"}, "url":"URL#4251672" }, { "@score":"1", "@id":"4251704", "info":{"authors":{"author":[{"@pid":"59/6726","text":"Guillaume Aucher"},{"@pid":"35/485","text":"François Schwarzentruber"}]},"title":"On the Complexity of Dynamic Epistemic Logic.","venue":"CoRR","volume":"abs/1310.6406","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AucherS13","ee":"http://arxiv.org/abs/1310.6406","url":"https://dblp.org/rec/journals/corr/AucherS13"}, "url":"URL#4251704" }, { "@score":"1", "@id":"4251707", "info":{"authors":{"author":[{"@pid":"131/6679","text":"Julien Audiffren"},{"@pid":"88/9175","text":"Hachem Kadri"}]},"title":"M-Power Regularized Least Squares Regression.","venue":"CoRR","volume":"abs/1310.2451","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AudiffrenK13a","ee":"http://arxiv.org/abs/1310.2451","url":"https://dblp.org/rec/journals/corr/AudiffrenK13a"}, "url":"URL#4251707" }, { "@score":"1", "@id":"4251712", "info":{"authors":{"author":[{"@pid":"48/4302","text":"Anne Auger"},{"@pid":"75/5339","text":"Nikolaus Hansen"}]},"title":"On Proving Linear Convergence of Comparison-based Step-size Adaptive Randomized Search on Scaling-Invariant Functions via Stability of Markov Chains.","venue":"CoRR","volume":"abs/1310.7697","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AugerH13","ee":"http://arxiv.org/abs/1310.7697","url":"https://dblp.org/rec/journals/corr/AugerH13"}, "url":"URL#4251712" }, { "@score":"1", "@id":"4251713", "info":{"authors":{"author":[{"@pid":"48/4302","text":"Anne Auger"},{"@pid":"75/5339","text":"Nikolaus Hansen"}]},"title":"Linear Convergence on Positively Homogeneous Functions of a Comparison Based Step-Size Adaptive Randomized Search: the (1+1) ES with Generalized One-fifth Success Rule.","venue":"CoRR","volume":"abs/1310.8397","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AugerH13a","ee":"http://arxiv.org/abs/1310.8397","url":"https://dblp.org/rec/journals/corr/AugerH13a"}, "url":"URL#4251713" }, { "@score":"1", "@id":"4251714", "info":{"authors":{"author":[{"@pid":"72/9357","text":"Guillaume Aupy"},{"@pid":"38/4452","text":"Anne Benoit"},{"@pid":"78/3532","text":"Thomas Hérault"},{"@pid":"r/YvesRobert","text":"Yves Robert"},{"@pid":"d/JackDongarra","text":"Jack J. Dongarra"}]},"title":"Optimal Checkpointing Period: Time vs. Energy.","venue":"CoRR","volume":"abs/1310.8456","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AupyBHRD13","ee":"http://arxiv.org/abs/1310.8456","url":"https://dblp.org/rec/journals/corr/AupyBHRD13"}, "url":"URL#4251714" }, { "@score":"1", "@id":"4251715", "info":{"authors":{"author":[{"@pid":"72/9357","text":"Guillaume Aupy"},{"@pid":"38/4452","text":"Anne Benoit"},{"@pid":"78/3532","text":"Thomas Hérault"},{"@pid":"r/YvesRobert","text":"Yves Robert"},{"@pid":"14/3872","text":"Frédéric Vivien"},{"@pid":"117/3811","text":"Dounia Zaidouni"}]},"title":"On the Combination of Silent Error Detection and Checkpointing.","venue":"CoRR","volume":"abs/1310.8486","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AupyBHRVZ13","ee":"http://arxiv.org/abs/1310.8486","url":"https://dblp.org/rec/journals/corr/AupyBHRVZ13"}, "url":"URL#4251715" }, { "@score":"1", "@id":"4251735", "info":{"authors":{"author":[{"@pid":"59/8210","text":"Rinat Ben Avraham"},{"@pid":"136/5850","text":"Omrit Filtser"},{"@pid":"48/3950","text":"Haim Kaplan"},{"@pid":"k/MatthewJKatz","text":"Matthew J. Katz"},{"@pid":"s/MichaSharir","text":"Micha Sharir"}]},"title":"The Discrete Fréchet Distance with Shortcuts via Approximate Distance Counting and Selection Techniques.","venue":"CoRR","volume":"abs/1310.5245","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/AvrahamFKKS13","ee":"http://arxiv.org/abs/1310.5245","url":"https://dblp.org/rec/journals/corr/AvrahamFKKS13"}, "url":"URL#4251735" }, { "@score":"1", "@id":"4251760", "info":{"authors":{"author":[{"@pid":"136/6170","text":"Radhakrishnan B."},{"@pid":"136/6122","text":"Shineraj G."},{"@pid":"136/6180","text":"Anver Muhammed K. M."}]},"title":"Application of Data Mining In Marketing.","venue":"CoRR","volume":"abs/1310.8462","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BGM13","ee":"http://arxiv.org/abs/1310.8462","url":"https://dblp.org/rec/journals/corr/BGM13"}, "url":"URL#4251760" }, { "@score":"1", "@id":"4251770", "info":{"authors":{"author":[{"@pid":"24/9830","text":"Yakov Babichenko"},{"@pid":"63/478","text":"Siddharth Barman"},{"@pid":"87/11118","text":"Ron Peretz"}]},"title":"Empirical Distribution of Equilibrium Play and Its Testing Application.","venue":"CoRR","volume":"abs/1310.7654","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabichenkoBP13a","ee":"http://arxiv.org/abs/1310.7654","url":"https://dblp.org/rec/journals/corr/BabichenkoBP13a"}, "url":"URL#4251770" }, { "@score":"1", "@id":"4251784", "info":{"authors":{"author":[{"@pid":"68/3209","text":"Lars Backstrom"},{"@pid":"k/JonMKleinberg","text":"Jon M. Kleinberg"}]},"title":"Romantic Partnerships and the Dispersion of Social Ties: A Network Analysis of Relationship Status on Facebook.","venue":"CoRR","volume":"abs/1310.6753","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BackstromK13","ee":"http://arxiv.org/abs/1310.6753","url":"https://dblp.org/rec/journals/corr/BackstromK13"}, "url":"URL#4251784" }, { "@score":"1", "@id":"4251790", "info":{"authors":{"author":[{"@pid":"b/CBackstrom","text":"Christer Bäckström"},{"@pid":"j/PeterJonsson","text":"Peter Jonsson"},{"@pid":"88/3220","text":"Sebastian Ordyniak"},{"@pid":"s/StefanSzeider","text":"Stefan Szeider"}]},"title":"A Complete Parameterized Complexity Analysis of Bounded Planning.","venue":"CoRR","volume":"abs/1310.7828","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaeckstroemJOS13","ee":"http://arxiv.org/abs/1310.7828","url":"https://dblp.org/rec/journals/corr/BaeckstroemJOS13"}, "url":"URL#4251790" }, { "@score":"1", "@id":"4251807", "info":{"authors":{"author":[{"@pid":"136/6010","text":"Anish Bahri"},{"@pid":"11/1648","text":"V. Sugumaran"},{"@pid":"31/8040","text":"S. Babu Devasenapati"}]},"title":"Misfire Detection in IC Engine using Kstar Algorithm.","venue":"CoRR","volume":"abs/1310.3717","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BahriSD13","ee":"http://arxiv.org/abs/1310.3717","url":"https://dblp.org/rec/journals/corr/BahriSD13"}, "url":"URL#4251807" }, { "@score":"1", "@id":"4251828", "info":{"authors":{"author":[{"@pid":"06/11358","text":"Hari Ram Balakrishnan"},{"@pid":"75/10518","text":"K. Giridhar"}]},"title":"Fractional Interference Alignment: Interference Alignment on Finite Alphabet Transmission.","venue":"CoRR","volume":"abs/1310.4993","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalakrishnanG13","ee":"http://arxiv.org/abs/1310.4993","url":"https://dblp.org/rec/journals/corr/BalakrishnanG13"}, "url":"URL#4251828" }, { "@score":"1", "@id":"4251833", "info":{"authors":{"author":[{"@pid":"136/6085","text":"Sriramkumar Balasubramanian"},{"@pid":"136/5703","text":"Raghuram Reddy Nagireddy"}]},"title":"Visualizing Bags of Vectors.","venue":"CoRR","volume":"abs/1310.3333","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalasubramanianN13","ee":"http://arxiv.org/abs/1310.3333","url":"https://dblp.org/rec/journals/corr/BalasubramanianN13"}, "url":"URL#4251833" }, { "@score":"1", "@id":"4251840", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"85/2046-2","text":"Marco Bianchi 0002"},{"@pid":"64/4583","text":"Franco Chiaraluce"},{"@pid":"55/3381","text":"Roberto Garello"},{"@pid":"123/4621","text":"Nicola Maturo"},{"@pid":"136/5878","text":"Ignacio Aguilar Sanchez"},{"@pid":"49/1848","text":"Stefano Cioni"}]},"title":"Advanced coding schemes against jamming in telecommand links.","venue":"CoRR","volume":"abs/1310.0721","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Baldi0CGMSC13","ee":"http://arxiv.org/abs/1310.0721","url":"https://dblp.org/rec/journals/corr/Baldi0CGMSC13"}, "url":"URL#4251840" }, { "@score":"1", "@id":"4251841", "info":{"authors":{"author":[{"@pid":"26/3594","text":"Marco Baldi"},{"@pid":"85/2046-2","text":"Marco Bianchi 0002"},{"@pid":"64/4583","text":"Franco Chiaraluce"},{"@pid":"55/3381","text":"Roberto Garello"},{"@pid":"136/5878","text":"Ignacio Aguilar Sanchez"},{"@pid":"49/1848","text":"Stefano Cioni"}]},"title":"Advanced channel coding for space mission telecommand links.","venue":"CoRR","volume":"abs/1310.0744","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Baldi0CGSC13","ee":"http://arxiv.org/abs/1310.0744","url":"https://dblp.org/rec/journals/corr/Baldi0CGSC13"}, "url":"URL#4251841" }, { "@score":"1", "@id":"4251846", "info":{"authors":{"author":{"@pid":"63/9672","text":"David Balduzzi"}},"title":"Randomized co-training: from cortical neurons to machine learning and back again.","venue":"CoRR","volume":"abs/1310.6536","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Balduzzi13","ee":"http://arxiv.org/abs/1310.6536","url":"https://dblp.org/rec/journals/corr/Balduzzi13"}, "url":"URL#4251846" }, { "@score":"1", "@id":"4251859", "info":{"authors":{"author":[{"@pid":"17/6547","text":"Krzysztof Banas"},{"@pid":"54/8296","text":"Przemyslaw Plaszewski"},{"@pid":"13/8120","text":"Pawel Maciol"}]},"title":"Numerical integration on GPUs for higher order finite elements.","venue":"CoRR","volume":"abs/1310.1191","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanasPM13","ee":"http://arxiv.org/abs/1310.1191","url":"https://dblp.org/rec/journals/corr/BanasPM13"}, "url":"URL#4251859" }, { "@score":"1", "@id":"4251878", "info":{"authors":{"author":[{"@pid":"130/3511","text":"Nikola Banic"},{"@pid":"l/SvenLoncaric","text":"Sven Loncaric"}]},"title":"Using the Random Sprays Retinex Algorithm for Global Illumination Estimation.","venue":"CoRR","volume":"abs/1310.0307","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanicL13","ee":"http://arxiv.org/abs/1310.0307","url":"https://dblp.org/rec/journals/corr/BanicL13"}, "url":"URL#4251878" }, { "@score":"1", "@id":"4251880", "info":{"authors":{"author":[{"@pid":"116/2719","text":"Matan Banin"},{"@pid":"47/2680","text":"Boaz Tsaban"}]},"title":"A reduction of semigroup DLP to classic DLP.","venue":"CoRR","volume":"abs/1310.7903","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaninT13","ee":"http://arxiv.org/abs/1310.7903","url":"https://dblp.org/rec/journals/corr/BaninT13"}, "url":"URL#4251880" }, { "@score":"1", "@id":"4251884", "info":{"authors":{"author":[{"@pid":"04/10044","text":"Michael J. Bannister"},{"@pid":"133/8627","text":"William E. Devanny"},{"@pid":"e/DEppstein","text":"David Eppstein"}]},"title":"Small Superpatterns for Dominance Drawing.","venue":"CoRR","volume":"abs/1310.3770","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BannisterDE13","ee":"http://arxiv.org/abs/1310.3770","url":"https://dblp.org/rec/journals/corr/BannisterDE13"}, "url":"URL#4251884" }, { "@score":"1", "@id":"4251912", "info":{"authors":{"author":[{"@pid":"59/3600","text":"Adrian Barbu"},{"@pid":"42/4448","text":"Yiyuan She"}]},"title":"Fast Simultaneous Feature Selection and Learning.","venue":"CoRR","volume":"abs/1310.2880","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarbuS13","ee":"http://arxiv.org/abs/1310.2880","url":"https://dblp.org/rec/journals/corr/BarbuS13"}, "url":"URL#4251912" }, { "@score":"1", "@id":"4251915", "info":{"authors":{"author":[{"@pid":"136/6124","text":"John Barco"},{"@pid":"136/5677","text":"Andres Guerra"},{"@pid":"44/2726","text":"Luis Muñoz"},{"@pid":"89/846","text":"Nicanor Quijano"}]},"title":"Optimal Routing and Scheduling of Charge for Electric Vehicles: Case Study.","venue":"CoRR","volume":"abs/1310.0145","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarcoGMQ13","ee":"http://arxiv.org/abs/1310.0145","url":"https://dblp.org/rec/journals/corr/BarcoGMQ13"}, "url":"URL#4251915" }, { "@score":"1", "@id":"4251920", "info":{"authors":{"author":[{"@pid":"117/3820","text":"Marco Bardoscia"},{"@pid":"45/10096","text":"Daniel Nagaj"},{"@pid":"36/3003","text":"Antonello Scardicchio"}]},"title":"The SAT-UNSAT transition in the adversarial SAT problem.","venue":"CoRR","volume":"abs/1310.0967","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BardosciaNS13","ee":"http://arxiv.org/abs/1310.0967","url":"https://dblp.org/rec/journals/corr/BardosciaNS13"}, "url":"URL#4251920" }, { "@score":"1", "@id":"4251922", "info":{"authors":{"author":[{"@pid":"b/AlexanderBarg","text":"Alexander Barg"},{"@pid":"136/6145","text":"Maxim Skriganov"}]},"title":"Association schemes on general measure spaces and zero-dimensional Abelian groups.","venue":"CoRR","volume":"abs/1310.5359","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BargS13","ee":"http://arxiv.org/abs/1310.5359","url":"https://dblp.org/rec/journals/corr/BargS13"}, "url":"URL#4251922" }, { "@score":"1", "@id":"4251927", "info":{"authors":{"author":[{"@pid":"63/2029","text":"Andrea Baronchelli"},{"@pid":"09/3744","text":"Vittorio Loreto"},{"@pid":"24/2272","text":"Andrea Puglisi"}]},"title":"Individual Biases, Cultural Evolution, and the Statistical Nature of Language Universals: The Case of Colour Naming Systems.","venue":"CoRR","volume":"abs/1310.7782","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaronchelliLP13","ee":"http://arxiv.org/abs/1310.7782","url":"https://dblp.org/rec/journals/corr/BaronchelliLP13"}, "url":"URL#4251927" }, { "@score":"1", "@id":"4251930", "info":{"authors":{"author":[{"@pid":"133/2138","text":"Axel Barrau"},{"@pid":"78/7143","text":"Silvère Bonnabel"}]},"title":"Intrinsic filtering on Lie groups with applications to attitude estimation.","venue":"CoRR","volume":"abs/1310.2539","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarrauB13","ee":"http://arxiv.org/abs/1310.2539","url":"https://dblp.org/rec/journals/corr/BarrauB13"}, "url":"URL#4251930" }, { "@score":"1", "@id":"4251946", "info":{"authors":{"author":[{"@pid":"136/5792","text":"Maryam Basly"},{"@pid":"43/1848","text":"Hedia Kochkar"},{"@pid":"47/1585","text":"Ammar Bouallegue"}]},"title":"Variance Based Scheduling Algorithm with Relay Selection and Resource Allocation in Cooperative OFDMA Networks.","venue":"CoRR","volume":"abs/1310.6397","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaslyKB13","ee":"http://arxiv.org/abs/1310.6397","url":"https://dblp.org/rec/journals/corr/BaslyKB13"}, "url":"URL#4251946" }, { "@score":"1", "@id":"4251957", "info":{"authors":{"author":[{"@pid":"27/1639","text":"Daniel J. Bates"},{"@pid":"46/9670","text":"Elizabeth Gross"},{"@pid":"80/3926","text":"Anton Leykin"},{"@pid":"136/6164","text":"Jose Israel Rodriguez"}]},"title":"Bertini for Macaulay2.","venue":"CoRR","volume":"abs/1310.3297","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BatesGLR13","ee":"http://arxiv.org/abs/1310.3297","url":"https://dblp.org/rec/journals/corr/BatesGLR13"}, "url":"URL#4251957" }, { "@score":"1", "@id":"4251960", "info":{"authors":{"author":{"@pid":"44/2560","text":"Christian Bauckhage"}},"title":"Computing the Kullback-Leibler Divergence between two Weibull Distributions.","venue":"CoRR","volume":"abs/1310.3713","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bauckhage13","ee":"http://arxiv.org/abs/1310.3713","url":"https://dblp.org/rec/journals/corr/Bauckhage13"}, "url":"URL#4251960" }, { "@score":"1", "@id":"4251961", "info":{"authors":{"author":[{"@pid":"44/2560","text":"Christian Bauckhage"},{"@pid":"40/3793","text":"Kristian Kersting"}]},"title":"Efficient Information Theoretic Clustering on Discrete Lattices.","venue":"CoRR","volume":"abs/1310.7114","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BauckhageK13","ee":"http://arxiv.org/abs/1310.7114","url":"https://dblp.org/rec/journals/corr/BauckhageK13"}, "url":"URL#4251961" }, { "@score":"1", "@id":"4251964", "info":{"authors":{"author":[{"@pid":"04/9366","text":"Miriam H. A. Bauer"},{"@pid":"32/8617","text":"Sebastiano Barbieri"},{"@pid":"182/1168","text":"Jan Klein 0001"},{"@pid":"31/3828","text":"Jan Egger"},{"@pid":"70/8484","text":"Daniela Kuhnt"},{"@pid":"f/BerndFreisleben","text":"Bernd Freisleben"},{"@pid":"87/4973","text":"Horst K. Hahn"},{"@pid":"89/4664","text":"Christopher Nimsky"}]},"title":"A Ray-based Approach for Boundary Estimation of Fiber Bundles Derived from Diffusion Tensor Imaging.","venue":"CoRR","volume":"abs/1310.6092","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BauerBKEKFHN13","ee":"http://arxiv.org/abs/1310.6092","url":"https://dblp.org/rec/journals/corr/BauerBKEKFHN13"}, "url":"URL#4251964" }, { "@score":"1", "@id":"4251967", "info":{"authors":{"author":[{"@pid":"30/1815","text":"Ulrich Bauer"},{"@pid":"76/4651","text":"Michael Kerber"},{"@pid":"71/8437","text":"Jan Reininghaus"}]},"title":"Distributed computation of persistent homology.","venue":"CoRR","volume":"abs/1310.0710","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BauerKR13","ee":"http://arxiv.org/abs/1310.0710","url":"https://dblp.org/rec/journals/corr/BauerKR13"}, "url":"URL#4251967" }, { "@score":"1", "@id":"4251969", "info":{"authors":{"author":[{"@pid":"136/5951","text":"Thomas M. Baumann"},{"@pid":"17/10670","text":"José Gracia"}]},"title":"Cudagrind: A Valgrind Extension for CUDA.","venue":"CoRR","volume":"abs/1310.0901","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaumannG13","ee":"http://arxiv.org/abs/1310.0901","url":"https://dblp.org/rec/journals/corr/BaumannG13"}, "url":"URL#4251969" }, { "@score":"1", "@id":"4251972", "info":{"authors":{"author":{"@pid":"08/2951","text":"Bruno Bauwens"}},"title":"Prefix and plain Kolmogorov complexity characterizations of 2-randomness: simple proofs.","venue":"CoRR","volume":"abs/1310.5230","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bauwens13a","ee":"http://arxiv.org/abs/1310.5230","url":"https://dblp.org/rec/journals/corr/Bauwens13a"}, "url":"URL#4251972" }, { "@score":"1", "@id":"4251977", "info":{"authors":{"author":[{"@pid":"95/9364","text":"Teja Damodaram Bavirisetti"},{"@pid":"46/10835","text":"Abhinav Ganesan"},{"@pid":"175/1464","text":"Prasad Krishnan"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"Precoding Based Network Alignment using Transform Approach for Acyclic Networks with Delay.","venue":"CoRR","volume":"abs/1310.2809","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BavirisettiGPR13","ee":"http://arxiv.org/abs/1310.2809","url":"https://dblp.org/rec/journals/corr/BavirisettiGPR13"}, "url":"URL#4251977" }, { "@score":"1", "@id":"4251989", "info":{"authors":{"author":[{"@pid":"89/2078","text":"Olivier Beaumont"},{"@pid":"e/LionelEyraudDubois","text":"Lionel Eyraud-Dubois"},{"@pid":"99/9082","text":"Paul Renaud-Goud"}]},"title":"Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints.","venue":"CoRR","volume":"abs/1310.5255","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeaumontER13","ee":"http://arxiv.org/abs/1310.5255","url":"https://dblp.org/rec/journals/corr/BeaumontER13"}, "url":"URL#4251989" }, { "@score":"1", "@id":"4251990", "info":{"authors":{"author":[{"@pid":"b/LucaBecchetti","text":"Luca Becchetti"},{"@pid":"84/4139","text":"Andrea E. F. Clementi"},{"@pid":"126/5223","text":"Emanuele Natale"},{"@pid":"79/834","text":"Francesco Pasquale"},{"@pid":"138/9054","text":"Riccardo Silvestri"},{"@pid":"t/LucaTrevisan","text":"Luca Trevisan"}]},"title":"Simple Dynamics for Majority Consensus.","venue":"CoRR","volume":"abs/1310.2858","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BecchettiCNPST13","ee":"http://arxiv.org/abs/1310.2858","url":"https://dblp.org/rec/journals/corr/BecchettiCNPST13"}, "url":"URL#4251990" }, { "@score":"1", "@id":"4251999", "info":{"authors":{"author":[{"@pid":"58/2558","text":"Niko Beerenwinkel"},{"@pid":"97/10045-1","text":"Stefano Beretta 0001"},{"@pid":"80/4509","text":"Paola Bonizzoni"},{"@pid":"59/1669","text":"Riccardo Dondi"},{"@pid":"85/5143","text":"Yuri Pirola"}]},"title":"Covering Pairs in Directed Acyclic Graphs.","venue":"CoRR","volume":"abs/1310.5037","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeerenwinkelBBDP13","ee":"http://arxiv.org/abs/1310.5037","url":"https://dblp.org/rec/journals/corr/BeerenwinkelBBDP13"}, "url":"URL#4251999" }, { "@score":"1", "@id":"4252015", "info":{"authors":{"author":[{"@pid":"06/2510","text":"Jason P. Bell"},{"@pid":"b/JABrzozowski","text":"Janusz A. Brzozowski"},{"@pid":"n/NelmaMoreira","text":"Nelma Moreira"},{"@pid":"30/5254","text":"Rogério Reis"}]},"title":"Symmetric Groups and Quotient Complexity of Boolean Operations.","venue":"CoRR","volume":"abs/1310.1841","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BellBMR13","ee":"http://arxiv.org/abs/1310.1841","url":"https://dblp.org/rec/journals/corr/BellBMR13"}, "url":"URL#4252015" }, { "@score":"1", "@id":"4252021", "info":{"authors":{"author":[{"@pid":"79/1975","text":"Carlo Bellettini"},{"@pid":"62/11141","text":"Matteo Camilli"},{"@pid":"75/1101","text":"Lorenzo Capra"},{"@pid":"32/6774","text":"Mattia Monga"}]},"title":"Distributed CTL Model Checking in the Cloud.","venue":"CoRR","volume":"abs/1310.6670","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BellettiniCCM13","ee":"http://arxiv.org/abs/1310.6670","url":"https://dblp.org/rec/journals/corr/BellettiniCCM13"}, "url":"URL#4252021" }, { "@score":"1", "@id":"4252023", "info":{"authors":{"author":{"@pid":"62/2695-2","text":"Emanuele Bellini 0002"}},"title":"On the Griesmer Bound for Systematic Codes.","venue":"CoRR","volume":"abs/1310.4060","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bellini13","ee":"http://arxiv.org/abs/1310.4060","url":"https://dblp.org/rec/journals/corr/Bellini13"}, "url":"URL#4252023" }, { "@score":"1", "@id":"4252024", "info":{"authors":{"author":[{"@pid":"62/2695-2","text":"Emanuele Bellini 0002"},{"@pid":"01/1289","text":"Guglielmo Morgari"},{"@pid":"136/5968","text":"Marco Coppola"}]},"title":"An Extension of Cook's Elastic Cipher.","venue":"CoRR","volume":"abs/1310.4050","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BelliniMC13","ee":"http://arxiv.org/abs/1310.4050","url":"https://dblp.org/rec/journals/corr/BelliniMC13"}, "url":"URL#4252024" }, { "@score":"1", "@id":"4252025", "info":{"authors":{"author":[{"@pid":"136/5766","text":"Thomas Bellitto"},{"@pid":"15/2487","text":"Tobias Marschall"},{"@pid":"31/3700","text":"Alexander Schönhuth"},{"@pid":"86/5666","text":"Gunnar W. Klau"}]},"title":"Next Generation Cluster Editing.","venue":"CoRR","volume":"abs/1310.3353","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BellittoMSK13","ee":"http://arxiv.org/abs/1310.3353","url":"https://dblp.org/rec/journals/corr/BellittoMSK13"}, "url":"URL#4252025" }, { "@score":"1", "@id":"4252030", "info":{"authors":{"author":[{"@pid":"59/1724","text":"Anton Belov"},{"@pid":"23/4454-1","text":"António Morgado 0001"},{"@pid":"340/6684-1","text":"João Marques-Silva 0001"}]},"title":"SAT-based Preprocessing for MaxSAT (extended version).","venue":"CoRR","volume":"abs/1310.2298","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BelovMM13","ee":"http://arxiv.org/abs/1310.2298","url":"https://dblp.org/rec/journals/corr/BelovMM13"}, "url":"URL#4252030" }, { "@score":"1", "@id":"4252031", "info":{"authors":{"author":[{"@pid":"99/8374","text":"Ido Ben-Zvi"},{"@pid":"81/49","text":"Yoram Moses"}]},"title":"The Shape of Reactive Coordination Tasks.","venue":"CoRR","volume":"abs/1310.6407","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ben-ZviM13","ee":"http://arxiv.org/abs/1310.6407","url":"https://dblp.org/rec/journals/corr/Ben-ZviM13"}, "url":"URL#4252031" }, { "@score":"1", "@id":"4252045", "info":{"authors":{"author":[{"@pid":"77/3851","text":"Itai Benjamini"},{"@pid":"25/8727","text":"Gil Cohen"},{"@pid":"12/8383","text":"Igor Shinkar"}]},"title":"Bi-Lipschitz Bijection between the Boolean Cube and the Hamming Ball.","venue":"CoRR","volume":"abs/1310.2017","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenjaminiCS13","ee":"http://arxiv.org/abs/1310.2017","url":"https://dblp.org/rec/journals/corr/BenjaminiCS13"}, "url":"URL#4252045" }, { "@score":"1", "@id":"4252069", "info":{"authors":{"author":{"@pid":"27/5090","text":"Kai Berger"}},"title":"A State Of the Art Report on Research in Multiple RGB-D sensor Setups.","venue":"CoRR","volume":"abs/1310.2050","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berger13","ee":"http://arxiv.org/abs/1310.2050","url":"https://dblp.org/rec/journals/corr/Berger13"}, "url":"URL#4252069" }, { "@score":"1", "@id":"4252070", "info":{"authors":{"author":{"@pid":"27/5090","text":"Kai Berger"}},"title":"The role of RGB-D benchmark datasets: an overview.","venue":"CoRR","volume":"abs/1310.2053","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berger13a","ee":"http://arxiv.org/abs/1310.2053","url":"https://dblp.org/rec/journals/corr/Berger13a"}, "url":"URL#4252070" }, { "@score":"1", "@id":"4252073", "info":{"authors":{"author":[{"@pid":"b/JanABergstra","text":"Jan A. Bergstra"},{"@pid":"56/4234","text":"Inge Bethke"},{"@pid":"p/APonse","text":"Alban Ponse"}]},"title":"Equations for formally real meadows.","venue":"CoRR","volume":"abs/1310.5011","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BergstraBP13","ee":"http://arxiv.org/abs/1310.5011","url":"https://dblp.org/rec/journals/corr/BergstraBP13"}, "url":"URL#4252073" }, { "@score":"1", "@id":"4252080", "info":{"authors":{"author":[{"@pid":"135/6192","text":"Guillaume Berhault"},{"@pid":"60/4351","text":"Camille Leroux"},{"@pid":"31/6022","text":"Christophe Jégo"},{"@pid":"07/3174","text":"Dominique Dallet"}]},"title":"Partial Sums Computation In Polar Codes Decoding.","venue":"CoRR","volume":"abs/1310.1712","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerhaultLJD13a","ee":"http://arxiv.org/abs/1310.1712","url":"https://dblp.org/rec/journals/corr/BerhaultLJD13a"}, "url":"URL#4252080" }, { "@score":"1", "@id":"4252083", "info":{"authors":{"author":[{"@pid":"136/5885","text":"Gordon J. Berman"},{"@pid":"136/6144","text":"Daniel M. Choi"},{"@pid":"75/5386","text":"William Bialek"},{"@pid":"123/4441","text":"Joshua W. Shaevitz"}]},"title":"Mapping the structure of drosophilid behavior.","venue":"CoRR","volume":"abs/1310.4249","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BermanCBS13","ee":"http://arxiv.org/abs/1310.4249","url":"https://dblp.org/rec/journals/corr/BermanCBS13"}, "url":"URL#4252083" }, { "@score":"1", "@id":"4252094", "info":{"authors":{"author":{"@pid":"27/9135","text":"Mario Berta"}},"title":"Quantum Side Information: Uncertainty Relations, Extractors, Channel Simulations.","venue":"CoRR","volume":"abs/1310.4581","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berta13","ee":"http://arxiv.org/abs/1310.4581","url":"https://dblp.org/rec/journals/corr/Berta13"}, "url":"URL#4252094" }, { "@score":"1", "@id":"4252099", "info":{"authors":{"author":[{"@pid":"123/4430","text":"Juliane Bertram"},{"@pid":"49/2734","text":"Peter Hauck"},{"@pid":"36/3234-2","text":"Michael Huber 0002"}]},"title":"An Improved Majority-Logic Decoder Offering Massively Parallel Decoding for Real-Time Control in Embedded Systems.","venue":"CoRR","volume":"abs/1310.4349","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BertramHH13","ee":"http://arxiv.org/abs/1310.4349","url":"https://dblp.org/rec/journals/corr/BertramHH13"}, "url":"URL#4252099" }, { "@score":"1", "@id":"4252111", "info":{"authors":{"author":[{"@pid":"136/5674","text":"Glenn S. Bevilacqua"},{"@pid":"136/6133","text":"Shealen Clare"},{"@pid":"g/AmitGoyal2","text":"Amit Goyal 0002"},{"@pid":"l/LVSLakshmanan","text":"Laks V. S. Lakshmanan"}]},"title":"Validating Network Value of Influencers by means of Explanations.","venue":"CoRR","volume":"abs/1310.5430","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BevilacquaC0L13","ee":"http://arxiv.org/abs/1310.5430","url":"https://dblp.org/rec/journals/corr/BevilacquaC0L13"}, "url":"URL#4252111" }, { "@score":"1", "@id":"4252118", "info":{"authors":{"author":[{"@pid":"132/8922","text":"Deepti Bhalla"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Improving the Quality of MT Output using Novel Name Entity Translation Scheme.","venue":"CoRR","volume":"abs/1310.0573","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhallaJM13a","ee":"http://arxiv.org/abs/1310.0573","url":"https://dblp.org/rec/journals/corr/BhallaJM13a"}, "url":"URL#4252118" }, { "@score":"1", "@id":"4252127", "info":{"authors":{"author":{"@pid":"95/4618","text":"Subhasis Bhattacharjee"}},"title":"Distributed Algorithm for Dynamic Data-Gathering in Sensor Network.","venue":"CoRR","volume":"abs/1310.3990","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bhattacharjee13","ee":"http://arxiv.org/abs/1310.3990","url":"https://dblp.org/rec/journals/corr/Bhattacharjee13"}, "url":"URL#4252127" }, { "@score":"1", "@id":"4252128", "info":{"authors":{"author":[{"@pid":"136/6104","text":"Saptarshi Bhattacharjee"},{"@pid":"37/531-2","text":"S. Arunkumar 0002"},{"@pid":"98/1337","text":"Samir Kumar Bandyopadhyay"}]},"title":"Personal Identification from Lip-Print Features using a Statistical Model.","venue":"CoRR","volume":"abs/1310.0036","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharjeeAB13","ee":"http://arxiv.org/abs/1310.0036","url":"https://dblp.org/rec/journals/corr/BhattacharjeeAB13"}, "url":"URL#4252128" }, { "@score":"1", "@id":"4252135", "info":{"authors":{"author":[{"@pid":"136/5747","text":"Paheli Bhattacharya"},{"@pid":"48/2626-1","text":"Arnab Bhattacharya 0001"}]},"title":"Evolution of the Modern Phase of Written Bangla: A Statistical Study.","venue":"CoRR","volume":"abs/1310.1590","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaB13","ee":"http://arxiv.org/abs/1310.1590","url":"https://dblp.org/rec/journals/corr/BhattacharyaB13"}, "url":"URL#4252135" }, { "@score":"1", "@id":"4252142", "info":{"authors":{"author":[{"@pid":"136/5955","text":"Aniket Bhawkar"},{"@pid":"136/6128","text":"Rohit Belsare"},{"@pid":"136/6123","text":"Fenil Gandhi"},{"@pid":"136/6016","text":"Pratiksha Somani"}]},"title":"Analysis of Errors: A Support System for Teachers to Analyse the Error Occurring to a Novice Programmer.","venue":"CoRR","volume":"abs/1310.1167","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhawkarBGS13","ee":"http://arxiv.org/abs/1310.1167","url":"https://dblp.org/rec/journals/corr/BhawkarBGS13"}, "url":"URL#4252142" }, { "@score":"1", "@id":"4252147", "info":{"authors":{"author":[{"@pid":"136/6174","text":"Avinash N. Bhute"},{"@pid":"56/1399","text":"B. B. Meshram"}]},"title":"IntelligentWeb Agent for Search Engines.","venue":"CoRR","volume":"abs/1310.4774","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhuteM13","ee":"http://arxiv.org/abs/1310.4774","url":"https://dblp.org/rec/journals/corr/BhuteM13"}, "url":"URL#4252147" }, { "@score":"1", "@id":"4252149", "info":{"authors":{"author":{"@pid":"135/1837","text":"Huibo Bi"}},"title":"Emergency and Normal Navigation in Confined Spaces.","venue":"CoRR","volume":"abs/1310.2886","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bi13","ee":"http://arxiv.org/abs/1310.2886","url":"https://dblp.org/rec/journals/corr/Bi13"}, "url":"URL#4252149" }, { "@score":"1", "@id":"4252156", "info":{"authors":{"author":{"@pid":"81/2670","text":"Matteo Bianchi 0001"}},"title":"A temporal semantics for Nilpotent Minimum logic.","venue":"CoRR","volume":"abs/1310.5916","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bianchi13","ee":"http://arxiv.org/abs/1310.5916","url":"https://dblp.org/rec/journals/corr/Bianchi13"}, "url":"URL#4252156" }, { "@score":"1", "@id":"4252164", "info":{"authors":{"author":{"@pid":"b/TBiedlUWaterloo","text":"Therese Biedl"}},"title":"On triangulating k-outerplanar graphs.","venue":"CoRR","volume":"abs/1310.1845","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Biedl13a","ee":"http://arxiv.org/abs/1310.1845","url":"https://dblp.org/rec/journals/corr/Biedl13a"}, "url":"URL#4252164" }, { "@score":"1", "@id":"4252180", "info":{"authors":{"author":{"@pid":"129/1487","text":"Giovanni Birolo"}},"title":"A Monadic Framework for Interactive Realizability.","venue":"CoRR","volume":"abs/1310.3971","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Birolo13a","ee":"http://arxiv.org/abs/1310.3971","url":"https://dblp.org/rec/journals/corr/Birolo13a"}, "url":"URL#4252180" }, { "@score":"1", "@id":"4252189", "info":{"authors":{"author":[{"@pid":"05/9874","text":"Adam Bjorndahl"},{"@pid":"h/JosephYHalpern","text":"Joseph Y. Halpern"},{"@pid":"p/RPass","text":"Rafael Pass"}]},"title":"Language-based Games.","venue":"CoRR","volume":"abs/1310.6408","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BjorndahlHP13","ee":"http://arxiv.org/abs/1310.6408","url":"https://dblp.org/rec/journals/corr/BjorndahlHP13"}, "url":"URL#4252189" }, { "@score":"1", "@id":"4252193", "info":{"authors":{"author":[{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"48/1437","text":"Luca Sanguinetti"},{"@pid":"19/4592","text":"Jakob Hoydis"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Designing Multi-User MIMO for Energy Efficiency: When is Massive MIMO the Answer?","venue":"CoRR","volume":"abs/1310.3843","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BjornsonSHD13","ee":"http://arxiv.org/abs/1310.3843","url":"https://dblp.org/rec/journals/corr/BjornsonSHD13"}, "url":"URL#4252193" }, { "@score":"1", "@id":"4252203", "info":{"authors":{"author":{"@pid":"b/LeliaBlin","text":"Lélia Blin"}},"title":"Algorithmes auto-stabilisants pour la construction d'arbres couvrants et la gestion d'entités autonomes.","venue":"CoRR","volume":"abs/1310.2494","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Blin13","ee":"http://arxiv.org/abs/1310.2494","url":"https://dblp.org/rec/journals/corr/Blin13"}, "url":"URL#4252203" }, { "@score":"1", "@id":"4252207", "info":{"authors":{"author":[{"@pid":"30/8037","text":"Jeremiah Blocki"},{"@pid":"b/ManuelBlum","text":"Manuel Blum 0001"},{"@pid":"d/AnupamDatta","text":"Anupam Datta"}]},"title":"GOTCHA Password Hackers!","venue":"CoRR","volume":"abs/1310.1137","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlockiBD13","ee":"http://arxiv.org/abs/1310.1137","url":"https://dblp.org/rec/journals/corr/BlockiBD13"}, "url":"URL#4252207" }, { "@score":"1", "@id":"4252208", "info":{"authors":{"author":[{"@pid":"27/9977","text":"Gideon Blocq"},{"@pid":"65/1175","text":"Ariel Orda"}]},"title":"Worst-Case Coalitions in Routing Games.","venue":"CoRR","volume":"abs/1310.3487","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlocqO13","ee":"http://arxiv.org/abs/1310.3487","url":"https://dblp.org/rec/journals/corr/BlocqO13"}, "url":"URL#4252208" }, { "@score":"1", "@id":"4252212", "info":{"authors":{"author":[{"@pid":"33/2110","text":"Johannes Blömer"},{"@pid":"127/6615","text":"Kathrin Bujna"},{"@pid":"39/6756","text":"Daniel Kuntze"}]},"title":"A Theoretical and Experimental Comparison of the EM and SEM Algorithm.","venue":"CoRR","volume":"abs/1310.5034","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlomerBK13","ee":"http://arxiv.org/abs/1310.5034","url":"https://dblp.org/rec/journals/corr/BlomerBK13"}, "url":"URL#4252212" }, { "@score":"1", "@id":"4252218", "info":{"authors":{"author":[{"@pid":"01/361","text":"Cheng Bo"},{"@pid":"l/XiangYangLi","text":"Xiang-Yang Li 0001"},{"@pid":"12/11514","text":"Taeho Jung"},{"@pid":"26/775","text":"XuFei Mao"}]},"title":"SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization.","venue":"CoRR","volume":"abs/1310.8187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoLJM13","ee":"http://arxiv.org/abs/1310.8187","url":"https://dblp.org/rec/journals/corr/BoLJM13"}, "url":"URL#4252218" }, { "@score":"1", "@id":"4252223", "info":{"authors":{"author":[{"@pid":"39/3615","text":"Holger Boche"},{"@pid":"40/3073","text":"Janis Noetzel"}]},"title":"The Classical-Quantum Multiple Access Channel with Conferencing Encoders and with Common Messages.","venue":"CoRR","volume":"abs/1310.1970","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BocheN13","ee":"http://arxiv.org/abs/1310.1970","url":"https://dblp.org/rec/journals/corr/BocheN13"}, "url":"URL#4252223" }, { "@score":"1", "@id":"4252225", "info":{"authors":{"author":[{"@pid":"02/702","text":"Georg Böcherer"},{"@pid":"126/4861","text":"Rana Ali Amjad"}]},"title":"Informational Divergence and Entropy Rate on Rooted Trees with Probabilities.","venue":"CoRR","volume":"abs/1310.2882","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BochererA13a","ee":"http://arxiv.org/abs/1310.2882","url":"https://dblp.org/rec/journals/corr/BochererA13a"}, "url":"URL#4252225" }, { "@score":"1", "@id":"4252230", "info":{"authors":{"author":[{"@pid":"244/6299","text":"Martin Bodlák"},{"@pid":"319/6422","text":"Vladimir Frolov"},{"@pid":"244/6206","text":"Vladimír Jarý"},{"@pid":"75/8074","text":"Stefan Huber"},{"@pid":"244/6093","text":"Igor Konorov"},{"@pid":"244/6297","text":"Dmytro Levit"},{"@pid":"244/6267","text":"Josef Nový"},{"@pid":"196/9942-2","text":"Stephan Paul 0002"},{"@pid":"244/6262","text":"Richard Salac"},{"@pid":"244/6161","text":"Miroslav Virius"}]},"title":"FPGA based data acquisition system for COMPASS experiment.","venue":"CoRR","volume":"abs/1310.1308","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BodlakFJHKLNPSV13","ee":"http://arxiv.org/abs/1310.1308","url":"https://dblp.org/rec/journals/corr/BodlakFJHKLNPSV13"}, "url":"URL#4252230" }, { "@score":"1", "@id":"4252234", "info":{"authors":{"author":[{"@pid":"13/2718","text":"Jean-Daniel Boissonnat"},{"@pid":"25/267","text":"Ramsay Dyer"},{"@pid":"39/5366","text":"Arijit Ghosh"}]},"title":"Delaunay stability via perturbations.","venue":"CoRR","volume":"abs/1310.7696","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoissonnatDG13","ee":"http://arxiv.org/abs/1310.7696","url":"https://dblp.org/rec/journals/corr/BoissonnatDG13"}, "url":"URL#4252234" }, { "@score":"1", "@id":"4252243", "info":{"authors":{"author":[{"@pid":"42/11199","text":"Marthe Bonamy"},{"@pid":"10/1734","text":"Nicolas Bousquet"}]},"title":"Brooks' theorem on powers of graphs.","venue":"CoRR","volume":"abs/1310.5493","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonamyB13","ee":"http://arxiv.org/abs/1310.5493","url":"https://dblp.org/rec/journals/corr/BonamyB13"}, "url":"URL#4252243" }, { "@score":"1", "@id":"4252250", "info":{"authors":{"author":[{"@pid":"89/991","text":"Roberto Bonato"},{"@pid":"22/4081","text":"Christian Retoré"}]},"title":"Learning Lambek grammars from proof frames.","venue":"CoRR","volume":"abs/1310.0576","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonatoR13","ee":"http://arxiv.org/abs/1310.0576","url":"https://dblp.org/rec/journals/corr/BonatoR13"}, "url":"URL#4252250" }, { "@score":"1", "@id":"4252257", "info":{"authors":{"author":[{"@pid":"131/6532","text":"Vena Pearl Bongolan"},{"@pid":"95/4234","text":"Rocco Rongo"},{"@pid":"41/6431","text":"Valeria Lupiano"},{"@pid":"79/3628","text":"Donato D'Ambrosio"},{"@pid":"58/6561","text":"William Spataro"},{"@pid":"08/3223","text":"Giulio Iovine"}]},"title":"A Probabilistic Approach to Risk Mapping for Mt. Etna.","venue":"CoRR","volume":"abs/1310.3360","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BongolanRLDSI13","ee":"http://arxiv.org/abs/1310.3360","url":"https://dblp.org/rec/journals/corr/BongolanRLDSI13"}, "url":"URL#4252257" }, { "@score":"1", "@id":"4252260", "info":{"authors":{"author":[{"@pid":"131/6607","text":"Edouard Bonnet"},{"@pid":"97/3615","text":"Vangelis Th. Paschos"}]},"title":"Parameterized (in)approximability of subset problems.","venue":"CoRR","volume":"abs/1310.5576","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonnetP13a","ee":"http://arxiv.org/abs/1310.5576","url":"https://dblp.org/rec/journals/corr/BonnetP13a"}, "url":"URL#4252260" }, { "@score":"1", "@id":"4252263", "info":{"authors":{"author":[{"@pid":"97/2014","text":"Flavia Bonomo"},{"@pid":"83/8685","text":"Oliver Schaudt"},{"@pid":"s/MayaJakobineStein","text":"Maya Stein"},{"@pid":"68/3212","text":"Mario Valencia-Pabon"}]},"title":"b-coloring is NP-hard on co-bipartite graphs and polytime solvable on tree-cographs.","venue":"CoRR","volume":"abs/1310.8313","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonomoSSV13","ee":"http://arxiv.org/abs/1310.8313","url":"https://dblp.org/rec/journals/corr/BonomoSSV13"}, "url":"URL#4252263" }, { "@score":"1", "@id":"4252298", "info":{"authors":{"author":[{"@pid":"b/PBose","text":"Prosenjit Bose"},{"@pid":"62/5065","text":"Jean-Lou De Carufel"},{"@pid":"24/3961","text":"Stephane Durocher"}]},"title":"Revisiting the Problem of Searching on a Line.","venue":"CoRR","volume":"abs/1310.1048","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoseCD13","ee":"http://arxiv.org/abs/1310.1048","url":"https://dblp.org/rec/journals/corr/BoseCD13"}, "url":"URL#4252298" }, { "@score":"1", "@id":"4252299", "info":{"authors":{"author":[{"@pid":"b/PBose","text":"Prosenjit Bose"},{"@pid":"34/4423","text":"Anna Lubiw"},{"@pid":"72/9960","text":"Vinayak Pathak"},{"@pid":"23/9126","text":"Sander Verdonschot"}]},"title":"Flipping Edge-Labelled Triangulations.","venue":"CoRR","volume":"abs/1310.1166","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoseLPV13","ee":"http://arxiv.org/abs/1310.1166","url":"https://dblp.org/rec/journals/corr/BoseLPV13"}, "url":"URL#4252299" }, { "@score":"1", "@id":"4252302", "info":{"authors":{"author":[{"@pid":"82/6711","text":"Alin Bostan"},{"@pid":"03/5542","text":"Guillaume Chèze"},{"@pid":"03/708","text":"Thomas Cluzeau"},{"@pid":"w/JAWeil","text":"Jacques-Arthur Weil"}]},"title":"Efficient Algorithms for Computing Rational First Integrals and Darboux Polynomials of Planar Polynomial Vector Fields.","venue":"CoRR","volume":"abs/1310.2778","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BostanCCW13","ee":"http://arxiv.org/abs/1310.2778","url":"https://dblp.org/rec/journals/corr/BostanCCW13"}, "url":"URL#4252302" }, { "@score":"1", "@id":"4252310", "info":{"authors":{"author":[{"@pid":"118/7184","text":"Adam Bouland"},{"@pid":"56/1358","text":"Scott Aaronson"}]},"title":"Any Beamsplitter Generates Universal Quantum Linear Optics.","venue":"CoRR","volume":"abs/1310.6718","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoulandA13","ee":"http://arxiv.org/abs/1310.6718","url":"https://dblp.org/rec/journals/corr/BoulandA13"}, "url":"URL#4252310" }, { "@score":"1", "@id":"4252331", "info":{"authors":{"author":[{"@pid":"117/0374","text":"Claire Boyer"},{"@pid":"43/173","text":"Pierre Weiss"},{"@pid":"31/7859","text":"Jérémie Bigot"}]},"title":"An algorithm for variable density sampling with block-constrained acquisition.","venue":"CoRR","volume":"abs/1310.4393","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoyerWB13","ee":"http://arxiv.org/abs/1310.4393","url":"https://dblp.org/rec/journals/corr/BoyerWB13"}, "url":"URL#4252331" }, { "@score":"1", "@id":"4252333", "info":{"authors":{"author":[{"@pid":"04/11267","text":"Rodica Bozianu"},{"@pid":"14/3467","text":"Catalin Dima"},{"@pid":"72/2839","text":"Constantin Enea"}]},"title":"Model Checking an Epistemic mu-calculus with Synchronous and Perfect Recall Semantics.","venue":"CoRR","volume":"abs/1310.6434","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BozianuDE13","ee":"http://arxiv.org/abs/1310.6434","url":"https://dblp.org/rec/journals/corr/BozianuDE13"}, "url":"URL#4252333" }, { "@score":"1", "@id":"4252336", "info":{"authors":{"author":[{"@pid":"120/7795","text":"Abbas Bradai"},{"@pid":"18/4550","text":"Toufik Ahmed"}]},"title":"On the Optimal Scheduling in Pull-based Real-Time P2P Streaming Systems: Layered and Non-Layered Streaming.","venue":"CoRR","volume":"abs/1310.5557","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BradaiA13","ee":"http://arxiv.org/abs/1310.5557","url":"https://dblp.org/rec/journals/corr/BradaiA13"}, "url":"URL#4252336" }, { "@score":"1", "@id":"4252337", "info":{"authors":{"author":[{"@pid":"29/5448","text":"Milan Bradonjic"},{"@pid":"m/MichaelMolloy","text":"Michael Molloy 0001"},{"@pid":"13/4177","text":"Guanhua Yan"}]},"title":"Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments.","venue":"CoRR","volume":"abs/1310.1942","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BradonjicMY13","ee":"http://arxiv.org/abs/1310.1942","url":"https://dblp.org/rec/journals/corr/BradonjicMY13"}, "url":"URL#4252337" }, { "@score":"1", "@id":"4252346", "info":{"authors":{"author":{"@pid":"41/8860","text":"Michael Brand"}},"title":"Arbitrary Sequence RAMs.","venue":"CoRR","volume":"abs/1310.4588","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brand13a","ee":"http://arxiv.org/abs/1310.4588","url":"https://dblp.org/rec/journals/corr/Brand13a"}, "url":"URL#4252346" }, { "@score":"1", "@id":"4252348", "info":{"authors":{"author":[{"@pid":"136/6093","text":"Filipe Brandão"},{"@pid":"53/373","text":"João Pedro Pedroso"}]},"title":"Bin Packing and Related Problems: General Arc-flow Formulation with Graph Compression.","venue":"CoRR","volume":"abs/1310.6887","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrandaoP13","ee":"http://arxiv.org/abs/1310.6887","url":"https://dblp.org/rec/journals/corr/BrandaoP13"}, "url":"URL#4252348" }, { "@score":"1", "@id":"4252350", "info":{"authors":{"author":[{"@pid":"88/2162","text":"René Brandenberg"},{"@pid":"39/6064-3","text":"Stefan König 0003"}]},"title":"Sharpening Geometric Inequalities using Computable Symmetry Measures.","venue":"CoRR","volume":"abs/1310.4368","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrandenbergK13","ee":"http://arxiv.org/abs/1310.4368","url":"https://dblp.org/rec/journals/corr/BrandenbergK13"}, "url":"URL#4252350" }, { "@score":"1", "@id":"4252358", "info":{"authors":{"author":{"@pid":"91/2962","text":"Torben Braüner"}},"title":"Hybrid-Logical Reasoning in False-Belief Tasks.","venue":"CoRR","volume":"abs/1310.6435","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brauner13","ee":"http://arxiv.org/abs/1310.6435","url":"https://dblp.org/rec/journals/corr/Brauner13"}, "url":"URL#4252358" }, { "@score":"1", "@id":"4252361", "info":{"authors":{"author":[{"@pid":"49/4278","text":"David Brayford"},{"@pid":"133/8462","text":"Momme Allalen"},{"@pid":"43/7803","text":"Volker Weinberg"}]},"title":"Extreme Scaling of Lattice Quantum Chromodynamics.","venue":"CoRR","volume":"abs/1310.5839","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrayfordAW13","ee":"http://arxiv.org/abs/1310.5839","url":"https://dblp.org/rec/journals/corr/BrayfordAW13"}, "url":"URL#4252361" }, { "@score":"1", "@id":"4252362", "info":{"authors":{"author":[{"@pid":"18/3197","text":"Tomás Brázdil"},{"@pid":"28/4743","text":"Taolue Chen"},{"@pid":"01/2980","text":"Vojtech Forejt"},{"@pid":"91/10961","text":"Petr Novotný 0001"},{"@pid":"42/10122","text":"Aistis Simaitis"}]},"title":"Solvency Markov Decision Processes with Interest.","venue":"CoRR","volume":"abs/1310.3119","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrazdilCFNS13","ee":"http://arxiv.org/abs/1310.3119","url":"https://dblp.org/rec/journals/corr/BrazdilCFNS13"}, "url":"URL#4252362" }, { "@score":"1", "@id":"4252368", "info":{"authors":{"author":[{"@pid":"21/3203","text":"Murray R. Bremner"},{"@pid":"27/10672","text":"Jiaxiong Hu"},{"@pid":"128/3820","text":"Luke Oeding"}]},"title":"The 3 x 3 x 3 hyperdeterminant as a polynomial in the fundamental invariants for SL(3, C) x SL(3, C) x SL(3, C).","venue":"CoRR","volume":"abs/1310.3257","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BremnerHO13","ee":"http://arxiv.org/abs/1310.3257","url":"https://dblp.org/rec/journals/corr/BremnerHO13"}, "url":"URL#4252368" }, { "@score":"1", "@id":"4252379", "info":{"authors":{"author":[{"@pid":"92/3060","text":"Lubos Brim"},{"@pid":"213/3728","text":"Milan Ceska 0002"},{"@pid":"06/5258","text":"Sven Drazan"},{"@pid":"86/2438","text":"David Safránek"}]},"title":"On Robustness Analysis of Stochastic Biochemical Systems by Probabilistic Model Checking.","venue":"CoRR","volume":"abs/1310.4734","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrimCDS13","ee":"http://arxiv.org/abs/1310.4734","url":"https://dblp.org/rec/journals/corr/BrimCDS13"}, "url":"URL#4252379" }, { "@score":"1", "@id":"4252382", "info":{"authors":{"author":[{"@pid":"96/2643","text":"Karl Bringmann"},{"@pid":"03/5688","text":"Thomas Sauerwald"},{"@pid":"24/8147","text":"Alexandre Stauffer"},{"@pid":"93/2604-1","text":"He Sun 0001"}]},"title":"Balls into bins via local search: cover time and maximum load.","venue":"CoRR","volume":"abs/1310.0801","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BringmannSS013","ee":"http://arxiv.org/abs/1310.0801","url":"https://dblp.org/rec/journals/corr/BringmannSS013"}, "url":"URL#4252382" }, { "@score":"1", "@id":"4252386", "info":{"authors":{"author":{"@pid":"35/701","text":"Christopher M. Brislawn"}},"title":"On the group-theoretic structure of lifted filter banks.","venue":"CoRR","volume":"abs/1310.0530","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brislawn13a","ee":"http://arxiv.org/abs/1310.0530","url":"https://dblp.org/rec/journals/corr/Brislawn13a"}, "url":"URL#4252386" }, { "@score":"1", "@id":"4252387", "info":{"authors":{"author":{"@pid":"35/701","text":"Christopher M. Brislawn"}},"title":"Group lifting structures for multirate filter banks I: Uniqueness of lifting factorizations.","venue":"CoRR","volume":"abs/1310.2206","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brislawn13b","ee":"http://arxiv.org/abs/1310.2206","url":"https://dblp.org/rec/journals/corr/Brislawn13b"}, "url":"URL#4252387" }, { "@score":"1", "@id":"4252388", "info":{"authors":{"author":{"@pid":"35/701","text":"Christopher M. Brislawn"}},"title":"Group lifting structures for multirate filter banks II: Linear phase filter banks.","venue":"CoRR","volume":"abs/1310.2208","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brislawn13c","ee":"http://arxiv.org/abs/1310.2208","url":"https://dblp.org/rec/journals/corr/Brislawn13c"}, "url":"URL#4252388" }, { "@score":"1", "@id":"4252389", "info":{"authors":{"author":{"@pid":"35/701","text":"Christopher M. Brislawn"}},"title":"Gain scaling for multirate filter banks.","venue":"CoRR","volume":"abs/1310.2305","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brislawn13d","ee":"http://arxiv.org/abs/1310.2305","url":"https://dblp.org/rec/journals/corr/Brislawn13d"}, "url":"URL#4252389" }, { "@score":"1", "@id":"4252390", "info":{"authors":{"author":[{"@pid":"35/701","text":"Christopher M. Brislawn"},{"@pid":"62/6327","text":"Jonathan Woodring"},{"@pid":"40/4449","text":"Susan M. Mniszewski"},{"@pid":"69/2849","text":"David E. DeMarle"},{"@pid":"88/2598","text":"James P. Ahrens"}]},"title":"Subband coding for large-scale scientific simulation data using JPEG 2000.","venue":"CoRR","volume":"abs/1310.2289","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrislawnWMDA13","ee":"http://arxiv.org/abs/1310.2289","url":"https://dblp.org/rec/journals/corr/BrislawnWMDA13"}, "url":"URL#4252390" }, { "@score":"1", "@id":"4252392", "info":{"authors":{"author":[{"@pid":"47/3847","text":"Katarina Britz"},{"@pid":"56/1139","text":"Ivan José Varzinczak"}]},"title":"Defeasible Modalities.","venue":"CoRR","volume":"abs/1310.6409","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BritzJ13","ee":"http://arxiv.org/abs/1310.6409","url":"https://dblp.org/rec/journals/corr/BritzJ13"}, "url":"URL#4252392" }, { "@score":"1", "@id":"4252393", "info":{"authors":{"author":[{"@pid":"20/9596","text":"Karla Brkic"},{"@pid":"136/6168","text":"Srdan Rasic"},{"@pid":"00/5595","text":"Axel Pinz"},{"@pid":"42/3275","text":"Sinisa Segvic"},{"@pid":"38/1687","text":"Zoran Kalafatic"}]},"title":"Combining Spatio-Temporal Appearance Descriptors and Optical Flow for Human Action Recognition in Video Data.","venue":"CoRR","volume":"abs/1310.0308","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrkicRPSK13","ee":"http://arxiv.org/abs/1310.0308","url":"https://dblp.org/rec/journals/corr/BrkicRPSK13"}, "url":"URL#4252393" }, { "@score":"1", "@id":"4252402", "info":{"authors":{"author":[{"@pid":"90/9508","text":"Tara Brough"},{"@pid":"26/3553","text":"Alan J. Cain"}]},"title":"Automaton semigroup constructions.","venue":"CoRR","volume":"abs/1310.4852","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BroughC13","ee":"http://arxiv.org/abs/1310.4852","url":"https://dblp.org/rec/journals/corr/BroughC13"}, "url":"URL#4252402" }, { "@score":"1", "@id":"4252406", "info":{"authors":{"author":[{"@pid":"76/11519","text":"Chloë Brown"},{"@pid":"24/1654","text":"Christos Efstratiou"},{"@pid":"92/131","text":"Ilias Leontiadis"},{"@pid":"04/1995","text":"Daniele Quercia"},{"@pid":"21/6419","text":"Cecilia Mascolo"}]},"title":"Tracking Serendipitous Interactions: How Individual Cultures Shape the Office.","venue":"CoRR","volume":"abs/1310.3652","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrownELQM13","ee":"http://arxiv.org/abs/1310.3652","url":"https://dblp.org/rec/journals/corr/BrownELQM13"}, "url":"URL#4252406" }, { "@score":"1", "@id":"4252413", "info":{"authors":{"author":[{"@pid":"57/2683","text":"Henning Bruhn"},{"@pid":"83/8685","text":"Oliver Schaudt"}]},"title":"Claw-free t-perfect graphs can be recognised in polynomial time.","venue":"CoRR","volume":"abs/1310.8186","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BruhnS13a","ee":"http://arxiv.org/abs/1310.8186","url":"https://dblp.org/rec/journals/corr/BruhnS13a"}, "url":"URL#4252413" }, { "@score":"1", "@id":"4252426", "info":{"authors":{"author":{"@pid":"10/7583-1","text":"Stefan Brunthaler 0001"}},"title":"Speculative Staging for Interpreter Optimization.","venue":"CoRR","volume":"abs/1310.2300","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brunthaler13","ee":"http://arxiv.org/abs/1310.2300","url":"https://dblp.org/rec/journals/corr/Brunthaler13"}, "url":"URL#4252426" }, { "@score":"1", "@id":"4252427", "info":{"authors":{"author":{"@pid":"42/5878","text":"Magiel Bruntink"}},"title":"Towards Base Rates in Software Analytics.","venue":"CoRR","volume":"abs/1310.0242","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bruntink13","ee":"http://arxiv.org/abs/1310.0242","url":"https://dblp.org/rec/journals/corr/Bruntink13"}, "url":"URL#4252427" }, { "@score":"1", "@id":"4252428", "info":{"authors":{"author":[{"@pid":"138/7786","text":"Bingni W. Brunton"},{"@pid":"136/6137","text":"Steven L. Brunton"},{"@pid":"136/6055","text":"Joshua L. Proctor"},{"@pid":"74/1516","text":"J. Nathan Kutz"}]},"title":"Optimal Sensor Placement and Enhanced Sparsity for Classification.","venue":"CoRR","volume":"abs/1310.4217","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BruntonBPK13","ee":"http://arxiv.org/abs/1310.4217","url":"https://dblp.org/rec/journals/corr/BruntonBPK13"}, "url":"URL#4252428" }, { "@score":"1", "@id":"4252439", "info":{"authors":{"author":[{"@pid":"136/5833","text":"Yilei Bu"},{"@pid":"98/152","text":"Steve Gregory"},{"@pid":"136/6075","text":"Harriet L. Mills"}]},"title":"Efficient local behavioral change strategies to reduce the spread of epidemics in networks.","venue":"CoRR","volume":"abs/1310.2169","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuGM13","ee":"http://arxiv.org/abs/1310.2169","url":"https://dblp.org/rec/journals/corr/BuGM13"}, "url":"URL#4252439" }, { "@score":"1", "@id":"4252450", "info":{"authors":{"author":[{"@pid":"70/3836","text":"Dmitry Bugaychenko"},{"@pid":"135/6584","text":"Alexandr Dzuba"}]},"title":"Musical recommendations and personalization in a social network.","venue":"CoRR","volume":"abs/1310.7428","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BugaychenkoD13","ee":"http://arxiv.org/abs/1310.7428","url":"https://dblp.org/rec/journals/corr/BugaychenkoD13"}, "url":"URL#4252450" }, { "@score":"1", "@id":"4252452", "info":{"authors":{"author":[{"@pid":"78/4353","text":"Peter Bühlmann"},{"@pid":"48/97","text":"Jonas Peters"},{"@pid":"136/5643","text":"Jan Ernest"}]},"title":"CAM: Causal Additive Models, high-dimensional order search and penalized regression.","venue":"CoRR","volume":"abs/1310.1533","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuhlmannPE13","ee":"http://arxiv.org/abs/1310.1533","url":"https://dblp.org/rec/journals/corr/BuhlmannPE13"}, "url":"URL#4252452" }, { "@score":"1", "@id":"4252457", "info":{"authors":{"author":[{"@pid":"03/1660","text":"Nicola Bui"},{"@pid":"19/3912","text":"Michele Rossi"}]},"title":"Staying Alive: System Design for Self-Sufficient Sensor Networks.","venue":"CoRR","volume":"abs/1310.7717","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuiR13","ee":"http://arxiv.org/abs/1310.7717","url":"https://dblp.org/rec/journals/corr/BuiR13"}, "url":"URL#4252457" }, { "@score":"1", "@id":"4252460", "info":{"authors":{"author":{"@pid":"136/6158","text":"Syed Ijaz Ahmad Bukhari"}},"title":"Real Time Data Warehouse.","venue":"CoRR","volume":"abs/1310.5254","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bukhari13","ee":"http://arxiv.org/abs/1310.5254","url":"https://dblp.org/rec/journals/corr/Bukhari13"}, "url":"URL#4252460" }, { "@score":"1", "@id":"4252464", "info":{"authors":{"author":{"@pid":"36/1518","text":"Larry Bull"}},"title":"Towards Application of the RBNK Model.","venue":"CoRR","volume":"abs/1310.5568","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bull13a","ee":"http://arxiv.org/abs/1310.5568","url":"https://dblp.org/rec/journals/corr/Bull13a"}, "url":"URL#4252464" }, { "@score":"1", "@id":"4252471", "info":{"authors":{"author":[{"@pid":"118/3155","text":"Daniel Bundala"},{"@pid":"72/9508","text":"Jakub Zavodny"}]},"title":"Optimal Sorting Networks.","venue":"CoRR","volume":"abs/1310.6271","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BundalaZ13","ee":"http://arxiv.org/abs/1310.6271","url":"https://dblp.org/rec/journals/corr/BundalaZ13"}, "url":"URL#4252471" }, { "@score":"1", "@id":"4252475", "info":{"authors":{"author":[{"@pid":"14/6974","text":"Serge Burckel"},{"@pid":"20/4678","text":"Emeric Gioan"},{"@pid":"44/5777","text":"Emmanuel Thomé"}]},"title":"Computation with No Memory, and Rearrangeable Multicast Networks.","venue":"CoRR","volume":"abs/1310.5380","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BurckelGT13","ee":"http://arxiv.org/abs/1310.5380","url":"https://dblp.org/rec/journals/corr/BurckelGT13"}, "url":"URL#4252475" }, { "@score":"1", "@id":"4252485", "info":{"authors":{"author":[{"@pid":"57/4916","text":"Sarit Buzaglo"},{"@pid":"58/5154","text":"Tuvi Etzion"}]},"title":"Perfect Permutations Codes with the Kendall's $τ$-Metric.","venue":"CoRR","volume":"abs/1310.5515","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuzagloE13","ee":"http://arxiv.org/abs/1310.5515","url":"https://dblp.org/rec/journals/corr/BuzagloE13"}, "url":"URL#4252485" }, { "@score":"1", "@id":"4252488", "info":{"authors":{"author":[{"@pid":"67/6368","text":"Mojtaba Nouri Bygi"},{"@pid":"g/MohammadGhodsi","text":"Mohammad Ghodsi"}]},"title":"Weak Visibility Queries of Line Segments in Simple Polygons and Polygonal Domains.","venue":"CoRR","volume":"abs/1310.7197","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/BygiG13a","ee":"http://arxiv.org/abs/1310.7197","url":"https://dblp.org/rec/journals/corr/BygiG13a"}, "url":"URL#4252488" }, { "@score":"1", "@id":"4252490", "info":{"authors":{"author":[{"@pid":"10/6734","text":"Jaroslaw Byrka"},{"@pid":"58/7942","text":"Shanfei Li"},{"@pid":"116/4732","text":"Bartosz Rybicki"}]},"title":"Improved approximation algorithm for k-level UFL with penalties, a simplistic view on randomizing the scaling parameter.","venue":"CoRR","volume":"abs/1310.2386","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ByrkaLR13","ee":"http://arxiv.org/abs/1310.2386","url":"https://dblp.org/rec/journals/corr/ByrkaLR13"}, "url":"URL#4252490" }, { "@score":"1", "@id":"4252505", "info":{"authors":{"author":[{"@pid":"117/7062","text":"Haipeng Cai"},{"@pid":"49/6002-6","text":"Jian Chen 0006"},{"@pid":"117/6999","text":"Alexander P. Auchus"}]},"title":"Depth-dependent Parallel Visualization with 3D Stylized Dense Tubes.","venue":"CoRR","volume":"abs/1310.2994","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiCA13","ee":"http://arxiv.org/abs/1310.2994","url":"https://dblp.org/rec/journals/corr/CaiCA13"}, "url":"URL#4252505" }, { "@score":"1", "@id":"4252506", "info":{"authors":{"author":[{"@pid":"117/7062","text":"Haipeng Cai"},{"@pid":"49/6002-6","text":"Jian Chen 0006"},{"@pid":"117/6999","text":"Alexander P. Auchus"},{"@pid":"87/6639","text":"David H. Laidlaw"}]},"title":"Composing DTI Visualizations with End-user Programming.","venue":"CoRR","volume":"abs/1310.2923","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiCAL13","ee":"http://arxiv.org/abs/1310.2923","url":"https://dblp.org/rec/journals/corr/CaiCAL13"}, "url":"URL#4252506" }, { "@score":"1", "@id":"4252508", "info":{"authors":{"author":[{"@pid":"c/LeizhenCai","text":"Leizhen Cai"},{"@pid":"136/5948","text":"Chengwei Guo"}]},"title":"Contracting Graphs to Split Graphs and Threshold Graphs.","venue":"CoRR","volume":"abs/1310.5786","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiG13","ee":"http://arxiv.org/abs/1310.5786","url":"https://dblp.org/rec/journals/corr/CaiG13"}, "url":"URL#4252508" }, { "@score":"1", "@id":"4252514", "info":{"authors":{"author":[{"@pid":"14/5359-1","text":"Yang Cai 0001"},{"@pid":"23/1799","text":"Mohammad Mahdian"},{"@pid":"23/6337","text":"Aranyak Mehta"},{"@pid":"117/4968","text":"Bo Waggoner"}]},"title":"Designing Markets for Daily Deals.","venue":"CoRR","volume":"abs/1310.0548","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiMMW13","ee":"http://arxiv.org/abs/1310.0548","url":"https://dblp.org/rec/journals/corr/CaiMMW13"}, "url":"URL#4252514" }, { "@score":"1", "@id":"4252517", "info":{"authors":{"author":[{"@pid":"41/2870","text":"T. Tony Cai"},{"@pid":"126/4947","text":"Anru Zhang"}]},"title":"ROP: Matrix Recovery via Rank-One Projections.","venue":"CoRR","volume":"abs/1310.5791","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiZ13a","ee":"http://arxiv.org/abs/1310.5791","url":"https://dblp.org/rec/journals/corr/CaiZ13a"}, "url":"URL#4252517" }, { "@score":"1", "@id":"4252519", "info":{"authors":{"author":[{"@pid":"26/3553","text":"Alan J. Cain"},{"@pid":"134/7531","text":"Robert D. Gray"},{"@pid":"43/6420","text":"António Malheiro"}]},"title":"Rewriting systems and biautomatic structures for Chinese, hypoplactic, and Sylvester monoids.","venue":"CoRR","volume":"abs/1310.6572","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CainGM13","ee":"http://arxiv.org/abs/1310.6572","url":"https://dblp.org/rec/journals/corr/CainGM13"}, "url":"URL#4252519" }, { "@score":"1", "@id":"4252529", "info":{"authors":{"author":[{"@pid":"89/4611","text":"Flávio du Pin Calmon"},{"@pid":"59/6288","text":"Mayank Varia"},{"@pid":"m/MurielMedard","text":"Muriel Médard"},{"@pid":"96/11466","text":"Mark M. Christiansen"},{"@pid":"d/KenRDuffy","text":"Ken R. Duffy"},{"@pid":"38/937","text":"Stefano Tessaro"}]},"title":"Bounds on inference.","venue":"CoRR","volume":"abs/1310.1512","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalmonVMCDT13","ee":"http://arxiv.org/abs/1310.1512","url":"https://dblp.org/rec/journals/corr/CalmonVMCDT13"}, "url":"URL#4252529" }, { "@score":"1", "@id":"4252531", "info":{"authors":{"author":[{"@pid":"62/8989","text":"Francesco Caltagirone"},{"@pid":"74/94","text":"Silvio Franz"},{"@pid":"12/1759","text":"Richard Morris"},{"@pid":"27/6064","text":"Lenka Zdeborová"}]},"title":"Dynamics and termination cost of spatially coupled mean-field models.","venue":"CoRR","volume":"abs/1310.2121","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaltagironeFMZ13","ee":"http://arxiv.org/abs/1310.2121","url":"https://dblp.org/rec/journals/corr/CaltagironeFMZ13"}, "url":"URL#4252531" }, { "@score":"1", "@id":"4252537", "info":{"authors":{"author":[{"@pid":"c/PeterJCameron","text":"Peter J. Cameron"},{"@pid":"76/10716","text":"Ben Fairbairn"},{"@pid":"77/679","text":"Maximilien Gadouleau"}]},"title":"Computing in permutation groups without memory.","venue":"CoRR","volume":"abs/1310.6008","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CameronFG13","ee":"http://arxiv.org/abs/1310.6008","url":"https://dblp.org/rec/journals/corr/CameronFG13"}, "url":"URL#4252537" }, { "@score":"1", "@id":"4252538", "info":{"authors":{"author":[{"@pid":"c/PeterJCameron","text":"Peter J. Cameron"},{"@pid":"76/10716","text":"Ben Fairbairn"},{"@pid":"77/679","text":"Maximilien Gadouleau"}]},"title":"Computing in matrix groups without memory.","venue":"CoRR","volume":"abs/1310.6009","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CameronFG13a","ee":"http://arxiv.org/abs/1310.6009","url":"https://dblp.org/rec/journals/corr/CameronFG13a"}, "url":"URL#4252538" }, { "@score":"1", "@id":"4252540", "info":{"authors":{"author":[{"@pid":"32/5293","text":"Gustavo Camps-Valls"},{"@pid":"12/1154-4","text":"Jaime Gutierrez 0004"},{"@pid":"61/7292","text":"Gabriel Gómez-Pérez"},{"@pid":"31/4807","text":"Jesús Malo"}]},"title":"On the Suitable Domain for SVM Training in Image Coding.","venue":"CoRR","volume":"abs/1310.5082","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Camps-VallsGGM13","ee":"http://arxiv.org/abs/1310.5082","url":"https://dblp.org/rec/journals/corr/Camps-VallsGGM13"}, "url":"URL#4252540" }, { "@score":"1", "@id":"4252541", "info":{"authors":{"author":[{"@pid":"32/5293","text":"Gustavo Camps-Valls"},{"@pid":"99/606","text":"Devis Tuia"},{"@pid":"50/1319","text":"Lorenzo Bruzzone"},{"@pid":"79/3767","text":"Jón Atli Benediktsson"}]},"title":"Advances in Hyperspectral Image Classification: Earth monitoring with statistical learning methods.","venue":"CoRR","volume":"abs/1310.5107","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Camps-VallsTBB13","ee":"http://arxiv.org/abs/1310.5107","url":"https://dblp.org/rec/journals/corr/Camps-VallsTBB13"}, "url":"URL#4252541" }, { "@score":"1", "@id":"4252543", "info":{"authors":{"author":[{"@pid":"28/932","text":"Emmanuel J. Candès"},{"@pid":"50/3993-5","text":"Xiaodong Li 0005"},{"@pid":"75/6691","text":"Mahdi Soltanolkotabi"}]},"title":"Phase Retrieval from masked Fourier transforms.","venue":"CoRR","volume":"abs/1310.3240","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CandesLS13","ee":"http://arxiv.org/abs/1310.3240","url":"https://dblp.org/rec/journals/corr/CandesLS13"}, "url":"URL#4252543" }, { "@score":"1", "@id":"4252550", "info":{"authors":{"author":[{"@pid":"136/6084","text":"Yanshuai Cao"},{"@pid":"18/3060","text":"Marcus A. Brubaker"},{"@pid":"07/2099","text":"David J. Fleet"},{"@pid":"91/3132","text":"Aaron Hertzmann"}]},"title":"Efficient Optimization for Sparse Gaussian Process Regression.","venue":"CoRR","volume":"abs/1310.6007","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaoBFH13","ee":"http://arxiv.org/abs/1310.6007","url":"https://dblp.org/rec/journals/corr/CaoBFH13"}, "url":"URL#4252550" }, { "@score":"1", "@id":"4252572", "info":{"authors":{"author":{"@pid":"136/5802","text":"Elian Carsenat"}},"title":"Onomastics and Big Data Mining.","venue":"CoRR","volume":"abs/1310.6311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Carsenat13","ee":"http://arxiv.org/abs/1310.6311","url":"https://dblp.org/rec/journals/corr/Carsenat13"}, "url":"URL#4252572" }, { "@score":"1", "@id":"4252581", "info":{"authors":{"author":[{"@pid":"120/9604","text":"Jordi Casas-Roma"},{"@pid":"74/634","text":"Jordi Herrera-Joancomartí"},{"@pid":"t/VicencTorra","text":"Vicenç Torra"}]},"title":"Evolutionary Algorithm for Graph Anonymization.","venue":"CoRR","volume":"abs/1310.0229","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Casas-RomaHT13","ee":"http://arxiv.org/abs/1310.0229","url":"https://dblp.org/rec/journals/corr/Casas-RomaHT13"}, "url":"URL#4252581" }, { "@score":"1", "@id":"4252592", "info":{"authors":{"author":[{"@pid":"123/4466","text":"Rodrigo de Castro"},{"@pid":"136/5918","text":"Andrés L. Ramírez"},{"@pid":"127/2209","text":"José Luis Ramírez"}]},"title":"Applications in Enumerative Combinatorics of Infinite Weighted Automata and Graphs.","venue":"CoRR","volume":"abs/1310.2449","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CastroRR13","ee":"http://arxiv.org/abs/1310.2449","url":"https://dblp.org/rec/journals/corr/CastroRR13"}, "url":"URL#4252592" }, { "@score":"1", "@id":"4252600", "info":{"authors":{"author":[{"@pid":"136/5811","text":"Flavio Massimiliano Cecchini"},{"@pid":"00/3705","text":"Elisabetta Fersini"}]},"title":"Named entity recognition using conditional random fields with non-local relational constraints.","venue":"CoRR","volume":"abs/1310.1964","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CecchiniF13","ee":"http://arxiv.org/abs/1310.1964","url":"https://dblp.org/rec/journals/corr/CecchiniF13"}, "url":"URL#4252600" }, { "@score":"1", "@id":"4252601", "info":{"authors":{"author":[{"@pid":"c/PatrickCegielski","text":"Patrick Cégielski"},{"@pid":"66/4277","text":"Serge Grigorieff"},{"@pid":"20/1779","text":"Irène Guessarian"}]},"title":"On Lattices of Regular Sets of Natural Integers Closed under Decrementation.","venue":"CoRR","volume":"abs/1310.1378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CegielskiGG13","ee":"http://arxiv.org/abs/1310.1378","url":"https://dblp.org/rec/journals/corr/CegielskiGG13"}, "url":"URL#4252601" }, { "@score":"1", "@id":"4252602", "info":{"authors":{"author":[{"@pid":"c/PatrickCegielski","text":"Patrick Cégielski"},{"@pid":"66/4277","text":"Serge Grigorieff"},{"@pid":"20/1779","text":"Irène Guessarian"}]},"title":"Newton representation of functions over natural integers having integral difference ratios.","venue":"CoRR","volume":"abs/1310.1507","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CegielskiGG13a","ee":"http://arxiv.org/abs/1310.1507","url":"https://dblp.org/rec/journals/corr/CegielskiGG13a"}, "url":"URL#4252602" }, { "@score":"1", "@id":"4252608", "info":{"authors":{"author":[{"@pid":"97/18","text":"Federico Cerutti 0001"},{"@pid":"d/PaulEDunne","text":"Paul E. Dunne"},{"@pid":"77/1121","text":"Massimiliano Giacomin"},{"@pid":"13/7563","text":"Mauro Vallati"}]},"title":"Computing Preferred Extensions in Abstract Argumentation: a SAT-based Approach.","venue":"CoRR","volume":"abs/1310.4986","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CeruttiDGV13","ee":"http://arxiv.org/abs/1310.4986","url":"https://dblp.org/rec/journals/corr/CeruttiDGV13"}, "url":"URL#4252608" }, { "@score":"1", "@id":"4252611", "info":{"authors":{"author":[{"@pid":"27/2364","text":"Julien Cervelle"},{"@pid":"57/142","text":"Alberto Dennunzio"},{"@pid":"98/3810","text":"Enrico Formenti"},{"@pid":"92/5061","text":"Julien Provillard"}]},"title":"Acceptance conditions for omega-languages and the Borel hierarchy.","venue":"CoRR","volume":"abs/1310.5032","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CervelleDFP13","ee":"http://arxiv.org/abs/1310.5032","url":"https://dblp.org/rec/journals/corr/CervelleDFP13"}, "url":"URL#4252611" }, { "@score":"1", "@id":"4252615", "info":{"authors":{"author":[{"@pid":"38/7482","text":"Anas Chaaban"},{"@pid":"12/218","text":"Aydin Sezgin"}]},"title":"The Approximate Capacity Region of the Gaussian Y-Channel.","venue":"CoRR","volume":"abs/1310.1732","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaabanS13","ee":"http://arxiv.org/abs/1310.1732","url":"https://dblp.org/rec/journals/corr/ChaabanS13"}, "url":"URL#4252615" }, { "@score":"1", "@id":"4252624", "info":{"authors":{"author":[{"@pid":"13/79","text":"André Chailloux"},{"@pid":"65/6315","text":"Gus Gutoski"},{"@pid":"53/8937","text":"Jamie Sikora"}]},"title":"Optimal bounds for quantum weak oblivious transfer.","venue":"CoRR","volume":"abs/1310.3262","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaillouxGS13","ee":"http://arxiv.org/abs/1310.3262","url":"https://dblp.org/rec/journals/corr/ChaillouxGS13"}, "url":"URL#4252624" }, { "@score":"1", "@id":"4252674", "info":{"authors":{"author":[{"@pid":"136/6052","text":"Guido Chari"},{"@pid":"g/DiegoGarbervetsky","text":"Diego Garbervetsky"},{"@pid":"40/7323","text":"Camillo Bruni"},{"@pid":"58/4781","text":"Marcus Denker"},{"@pid":"d/SDucasse","text":"Stéphane Ducasse"}]},"title":"Waterfall: Primitives Generation on the Fly.","venue":"CoRR","volume":"abs/1310.2741","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChariGBDD13","ee":"http://arxiv.org/abs/1310.2741","url":"https://dblp.org/rec/journals/corr/ChariGBDD13"}, "url":"URL#4252674" }, { "@score":"1", "@id":"4252678", "info":{"authors":{"author":[{"@pid":"77/94","text":"Emilie Charlier"},{"@pid":"47/10698-2","text":"Julien Leroy 0002"},{"@pid":"30/1875","text":"Michel Rigo"}]},"title":"Towards an analogue of Cobham's theorem for beta-numerations.","venue":"CoRR","volume":"abs/1310.0309","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CharlierLR13","ee":"http://arxiv.org/abs/1310.0309","url":"https://dblp.org/rec/journals/corr/CharlierLR13"}, "url":"URL#4252678" }, { "@score":"1", "@id":"4252693", "info":{"authors":{"author":[{"@pid":"35/6012","text":"Kaustuv Chaudhuri"},{"@pid":"21/5646","text":"Joëlle Despeyroux"}]},"title":"A Hybrid Linear Logic for Constrained Transition Systems with Applications to Molecular Biology.","venue":"CoRR","volume":"abs/1310.4310","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaudhuriD13c","ee":"http://arxiv.org/abs/1310.4310","url":"https://dblp.org/rec/journals/corr/ChaudhuriD13c"}, "url":"URL#4252693" }, { "@score":"1", "@id":"4252696", "info":{"authors":{"author":[{"@pid":"74/4444","text":"Kunal N. Chaudhury"},{"@pid":"131/6764","text":"Yuehaw Khoo"},{"@pid":"22/3454","text":"Amit Singer"}]},"title":"Large-Scale Sensor Network Localization via Rigid Subnetwork Registration.","venue":"CoRR","volume":"abs/1310.8135","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaudhuryKS13","ee":"http://arxiv.org/abs/1310.8135","url":"https://dblp.org/rec/journals/corr/ChaudhuryKS13"}, "url":"URL#4252696" }, { "@score":"1", "@id":"4252704", "info":{"authors":{"author":[{"@pid":"52/5006","text":"Prasad Chebolu"},{"@pid":"65/6330","text":"Mary Cryan"},{"@pid":"m/RussellAMartin","text":"Russell Martin"}]},"title":"Exact counting of Euler Tours for Graphs of Bounded Treewidth.","venue":"CoRR","volume":"abs/1310.0185","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheboluCM13","ee":"http://arxiv.org/abs/1310.0185","url":"https://dblp.org/rec/journals/corr/CheboluCM13"}, "url":"URL#4252704" }, { "@score":"1", "@id":"4252711", "info":{"authors":{"author":[{"@pid":"136/5635","text":"Abdessalem Chekhchoukh"},{"@pid":"136/5744","text":"Malik Goumidi"},{"@pid":"73/6496","text":"Nicolas Vuillerme"},{"@pid":"08/2109","text":"Yohan Payan"},{"@pid":"42/4516","text":"Nicolas Glade"}]},"title":"Electrotactile vision substitution for 3D trajectory following.","venue":"CoRR","volume":"abs/1310.4392","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChekhchoukhGVPG13","ee":"http://arxiv.org/abs/1310.4392","url":"https://dblp.org/rec/journals/corr/ChekhchoukhGVPG13"}, "url":"URL#4252711" }, { "@score":"1", "@id":"4252715", "info":{"authors":{"author":[{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"},{"@pid":"81/6236-1","text":"Zhaoyang Zhang 0001"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"Adaptive Mode Selection in Multiuser MISO Cognitive Networks with Limited Cooperation and Feedback.","venue":"CoRR","volume":"abs/1310.4301","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chen0Y13","ee":"http://arxiv.org/abs/1310.4301","url":"https://dblp.org/rec/journals/corr/Chen0Y13"}, "url":"URL#4252715" }, { "@score":"1", "@id":"4252722", "info":{"authors":{"author":{"@pid":"15/1975-1","text":"Yudong Chen 0001"}},"title":"Incoherence-Optimal Matrix Completion.","venue":"CoRR","volume":"abs/1310.0154","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chen13e","ee":"http://arxiv.org/abs/1310.0154","url":"https://dblp.org/rec/journals/corr/Chen13e"}, "url":"URL#4252722" }, { "@score":"1", "@id":"4252725", "info":{"authors":{"author":[{"@pid":"c/WeiChen16","text":"Wei Chen 0016"},{"@pid":"85/3071","text":"Yiannis Andreopoulos"},{"@pid":"32/4809","text":"Ian J. Wassell"},{"@pid":"21/6763","text":"Miguel R. D. Rodrigues"}]},"title":"Towards Energy Neutrality in Energy Harvesting Wireless Sensor Networks: A Case for Distributed Compressive Sensing?","venue":"CoRR","volume":"abs/1310.4761","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenAWR13","ee":"http://arxiv.org/abs/1310.4761","url":"https://dblp.org/rec/journals/corr/ChenAWR13"}, "url":"URL#4252725" }, { "@score":"1", "@id":"4252728", "info":{"authors":{"author":[{"@pid":"11/5123-2","text":"Yuxin Chen 0002"},{"@pid":"82/8759","text":"Yuejie Chi"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea Goldsmith"}]},"title":"Exact and Stable Covariance Estimation from Quadratic Sampling via Convex Programming.","venue":"CoRR","volume":"abs/1310.0807","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenCG13","ee":"http://arxiv.org/abs/1310.0807","url":"https://dblp.org/rec/journals/corr/ChenCG13"}, "url":"URL#4252728" }, { "@score":"1", "@id":"4252732", "info":{"authors":{"author":[{"@pid":"48/6","text":"Sheng-Gwo Chen"},{"@pid":"03/3133","text":"Mei-Hsiu Chi"},{"@pid":"17/2553","text":"Jyh-Yang Wu"}]},"title":"High-order algorithms for solving eigenproblems over discrete surfaces.","venue":"CoRR","volume":"abs/1310.4807","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenCW13","ee":"http://arxiv.org/abs/1310.4807","url":"https://dblp.org/rec/journals/corr/ChenCW13"}, "url":"URL#4252732" }, { "@score":"1", "@id":"4252739", "info":{"authors":{"author":[{"@pid":"11/5123-2","text":"Yuxin Chen 0002"},{"@pid":"e/YoninaCEldar","text":"Yonina C. Eldar"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea J. Goldsmith"}]},"title":"An Algorithm for Exact Super-resolution and Phase Retrieval.","venue":"CoRR","volume":"abs/1310.7552","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenEG13","ee":"http://arxiv.org/abs/1310.7552","url":"https://dblp.org/rec/journals/corr/ChenEG13"}, "url":"URL#4252739" }, { "@score":"1", "@id":"4252747", "info":{"authors":{"author":[{"@pid":"136/5825","text":"Dajiang Chen"},{"@pid":"30/6713","text":"Shaoquan Jiang"},{"@pid":"52/1374","text":"Zhiguang Qin"}]},"title":"Rate Efficient Authentication over a Wiretap Channel.","venue":"CoRR","volume":"abs/1310.3902","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenJQ13","ee":"http://arxiv.org/abs/1310.3902","url":"https://dblp.org/rec/journals/corr/ChenJQ13"}, "url":"URL#4252747" }, { "@score":"1", "@id":"4252748", "info":{"authors":{"author":[{"@pid":"13/3479-9","text":"Lin Chen 0009"},{"@pid":"j/KlausJansen","text":"Klaus Jansen"},{"@pid":"91/5622","text":"Guochuan Zhang"}]},"title":"On the optimality of approximation schemes for the classical scheduling problem.","venue":"CoRR","volume":"abs/1310.0398","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenJZ13","ee":"http://arxiv.org/abs/1310.0398","url":"https://dblp.org/rec/journals/corr/ChenJZ13"}, "url":"URL#4252748" }, { "@score":"1", "@id":"4252755", "info":{"authors":{"author":[{"@pid":"c/KaiChen13","text":"Kai Chen 0013"},{"@pid":"67/229","text":"Kai Niu 0001"},{"@pid":"99/5332-1","text":"Zhiqiang He 0001"},{"@pid":"32/2368","text":"Jiaru Lin"}]},"title":"Polar Coded HARQ Scheme with Chase Combining.","venue":"CoRR","volume":"abs/1310.6650","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenNHL13","ee":"http://arxiv.org/abs/1310.6650","url":"https://dblp.org/rec/journals/corr/ChenNHL13"}, "url":"URL#4252755" }, { "@score":"1", "@id":"4252761", "info":{"authors":{"author":[{"@pid":"92/6289-22","text":"Jie Chen 0022"},{"@pid":"69/6086","text":"Cédric Richard"},{"@pid":"23/4078","text":"Ali H. Sayed"}]},"title":"Diffusion LMS for clustered multitask networks.","venue":"CoRR","volume":"abs/1310.8615","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenRS13","ee":"http://arxiv.org/abs/1310.8615","url":"https://dblp.org/rec/journals/corr/ChenRS13"}, "url":"URL#4252761" }, { "@score":"1", "@id":"4252766", "info":{"authors":{"author":[{"@pid":"13/5568-2","text":"Zhixiong Chen 0002"},{"@pid":"s/IgorShparlinski","text":"Igor E. Shparlinski"},{"@pid":"71/2490","text":"Arne Winterhof"}]},"title":"Covering sets for limited-magnitude errors.","venue":"CoRR","volume":"abs/1310.0120","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenSW13","ee":"http://arxiv.org/abs/1310.0120","url":"https://dblp.org/rec/journals/corr/ChenSW13"}, "url":"URL#4252766" }, { "@score":"1", "@id":"4252767", "info":{"authors":{"author":[{"@pid":"32/6098-1","text":"Yin Chen 0001"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"128/5716","text":"Jinxiao Zhu"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"}]},"title":"Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process.","venue":"CoRR","volume":"abs/1310.8374","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenSZJ13","ee":"http://arxiv.org/abs/1310.8374","url":"https://dblp.org/rec/journals/corr/ChenSZJ13"}, "url":"URL#4252767" }, { "@score":"1", "@id":"4252769", "info":{"authors":{"author":[{"@pid":"15/4682","text":"Junzhou Chen"},{"@pid":"11/2362","text":"Kin Hong Wong"}]},"title":"Calibration of an Articulated Camera System with Scale Factor Estimation.","venue":"CoRR","volume":"abs/1310.4713","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenW13a","ee":"http://arxiv.org/abs/1310.4713","url":"https://dblp.org/rec/journals/corr/ChenW13a"}, "url":"URL#4252769" }, { "@score":"1", "@id":"4252775", "info":{"authors":{"author":[{"@pid":"49/6574-19","text":"Yi Chen 0019"},{"@pid":"91/952-1","text":"Xiaolong Wang 0001"},{"@pid":"41/1662","text":"Bo Yuan"}]},"title":"Overlapping community detection in signed networks.","venue":"CoRR","volume":"abs/1310.4023","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenWY13","ee":"http://arxiv.org/abs/1310.4023","url":"https://dblp.org/rec/journals/corr/ChenWY13"}, "url":"URL#4252775" }, { "@score":"1", "@id":"4252781", "info":{"authors":{"author":[{"@pid":"15/4682","text":"Junzhou Chen"},{"@pid":"13/4790","text":"Yong You"}]},"title":"Early Fire Detection Using HEP and Space-time Analysis.","venue":"CoRR","volume":"abs/1310.1855","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenY13b","ee":"http://arxiv.org/abs/1310.1855","url":"https://dblp.org/rec/journals/corr/ChenY13b"}, "url":"URL#4252781" }, { "@score":"1", "@id":"4252788", "info":{"authors":{"author":[{"@pid":"56/1670-2","text":"Ning Chen 0002"},{"@pid":"50/2644-1","text":"Jun Zhu 0001"},{"@pid":"79/1081","text":"Fei Xia"},{"@pid":"36/2259-10","text":"Bo Zhang 0010"}]},"title":"Discriminative Relational Topic Models.","venue":"CoRR","volume":"abs/1310.2409","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenZXZ13","ee":"http://arxiv.org/abs/1310.2409","url":"https://dblp.org/rec/journals/corr/ChenZXZ13"}, "url":"URL#4252788" }, { "@score":"1", "@id":"4252791", "info":{"authors":{"author":[{"@pid":"96/3253","text":"James Cheney"},{"@pid":"97/4946","text":"Sam Lindley"},{"@pid":"136/5817","text":"Gabriel Radanne"},{"@pid":"w/PhilipWadler","text":"Philip Wadler"}]},"title":"Effective Quotation.","venue":"CoRR","volume":"abs/1310.4780","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheneyLRW13","ee":"http://arxiv.org/abs/1310.4780","url":"https://dblp.org/rec/journals/corr/CheneyLRW13"}, "url":"URL#4252791" }, { "@score":"1", "@id":"4252796", "info":{"authors":{"author":[{"@pid":"03/11338","text":"Teng-Hu Cheng"},{"@pid":"39/11049","text":"Zhen Kan"},{"@pid":"136/5843","text":"Joel A. Rosenfeld"},{"@pid":"51/208","text":"Warren E. Dixon"}]},"title":"Decentralized formation control with connectivity maintenance and collision avoidance under limited and intermittent sensing.","venue":"CoRR","volume":"abs/1310.0371","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengKRD13","ee":"http://arxiv.org/abs/1310.0371","url":"https://dblp.org/rec/journals/corr/ChengKRD13"}, "url":"URL#4252796" }, { "@score":"1", "@id":"4252802", "info":{"authors":{"author":[{"@pid":"46/1838-1","text":"Qi Cheng 0001"},{"@pid":"41/544","text":"Daqing Wan"},{"@pid":"127/3531","text":"Jincheng Zhuang"}]},"title":"Traps to the BGJT-Algorithm for Discrete Logarithms.","venue":"CoRR","volume":"abs/1310.5124","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengWZ13","ee":"http://arxiv.org/abs/1310.5124","url":"https://dblp.org/rec/journals/corr/ChengWZ13"}, "url":"URL#4252802" }, { "@score":"1", "@id":"4252803", "info":{"authors":{"author":[{"@pid":"45/7592","text":"Ming-Ming Cheng"},{"@pid":"13/8659-1","text":"Shuai Zheng 0001"},{"@pid":"98/8226","text":"Wen-Yan Lin"},{"@pid":"24/6033","text":"Jonathan Warrell"},{"@pid":"02/8067","text":"Vibhav Vineet"},{"@pid":"37/8610","text":"Paul Sturgess"},{"@pid":"42/3092","text":"Nigel T. Crook"},{"@pid":"45/1575","text":"Niloy J. Mitra"},{"@pid":"t/PhilipHSTorr","text":"Philip H. S. Torr"}]},"title":"ImageSpirit: Verbal Guided Image Parsing.","venue":"CoRR","volume":"abs/1310.4389","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengZLWVSCMT13","ee":"http://arxiv.org/abs/1310.4389","url":"https://dblp.org/rec/journals/corr/ChengZLWVSCMT13"}, "url":"URL#4252803" }, { "@score":"1", "@id":"4252807", "info":{"authors":{"author":[{"@pid":"89/9463","text":"Seunggyun Cheong"},{"@pid":"22/4954","text":"Ian R. Manchester"}]},"title":"Input Design for Model Discrimination and Fault Detection via Convex Relaxation.","venue":"CoRR","volume":"abs/1310.7262","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheongM13","ee":"http://arxiv.org/abs/1310.7262","url":"https://dblp.org/rec/journals/corr/CheongM13"}, "url":"URL#4252807" }, { "@score":"1", "@id":"4252809", "info":{"authors":{"author":[{"@pid":"72/10237","text":"Sundeep Prabhakar Chepuri"},{"@pid":"50/3359","text":"Geert Leus"}]},"title":"Sparsity-Promoting Sensor Selection for Non-linear Measurement Models.","venue":"CoRR","volume":"abs/1310.5251","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChepuriL13","ee":"http://arxiv.org/abs/1310.5251","url":"https://dblp.org/rec/journals/corr/ChepuriL13"}, "url":"URL#4252809" }, { "@score":"1", "@id":"4252813", "info":{"authors":{"author":[{"@pid":"136/5739","text":"Danila D. Cherkashin"},{"@pid":"27/2225","text":"Jakub Kozik"}]},"title":"A note on random greedy coloring of uniform hypergraphs.","venue":"CoRR","volume":"abs/1310.1368","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CherkashinK13","ee":"http://arxiv.org/abs/1310.1368","url":"https://dblp.org/rec/journals/corr/CherkashinK13"}, "url":"URL#4252813" }, { "@score":"1", "@id":"4252814", "info":{"authors":{"author":[{"@pid":"136/5756","text":"Michael Cherkassky"},{"@pid":"125/2287","text":"Luke Bornn"}]},"title":"Sequential Monte Carlo Bandits.","venue":"CoRR","volume":"abs/1310.1404","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CherkasskyB13","ee":"http://arxiv.org/abs/1310.1404","url":"https://dblp.org/rec/journals/corr/CherkasskyB13"}, "url":"URL#4252814" }, { "@score":"1", "@id":"4252819", "info":{"authors":{"author":[{"@pid":"02/10611","text":"Kent Tsz Kan Cheung"},{"@pid":"03/10239","text":"Shaoshi Yang"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Achieving maximum energy-efficiency in multi-relay OFDMA cellular networks: a fractional programming approach.","venue":"CoRR","volume":"abs/1310.7839","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheungYH13","ee":"http://arxiv.org/abs/1310.7839","url":"https://dblp.org/rec/journals/corr/CheungYH13"}, "url":"URL#4252819" }, { "@score":"1", "@id":"4252827", "info":{"authors":{"author":[{"@pid":"57/6150","text":"Andrew M. Childs"},{"@pid":"64/6959","text":"Gábor Ivanyos"}]},"title":"Quantum computation of discrete logarithms in semigroups.","venue":"CoRR","volume":"abs/1310.6238","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChildsI13","ee":"http://arxiv.org/abs/1310.6238","url":"https://dblp.org/rec/journals/corr/ChildsI13"}, "url":"URL#4252827" }, { "@score":"1", "@id":"4252834", "info":{"authors":{"author":[{"@pid":"07/7066","text":"Hamidreza Chitsaz"},{"@pid":"14/10451","text":"Mohammad Aminisharifabad"}]},"title":"Exact Learning of RNA Energy Parameters From Structure.","venue":"CoRR","volume":"abs/1310.4223","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChitsazA13","ee":"http://arxiv.org/abs/1310.4223","url":"https://dblp.org/rec/journals/corr/ChitsazA13"}, "url":"URL#4252834" }, { "@score":"1", "@id":"4252837", "info":{"authors":{"author":[{"@pid":"c/JChlebikova","text":"Janka Chlebíková"},{"@pid":"72/10358","text":"Morgan Chopin"}]},"title":"The Firefighter Problem: A Structural Analysis.","venue":"CoRR","volume":"abs/1310.2322","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChlebikovaC13","ee":"http://arxiv.org/abs/1310.2322","url":"https://dblp.org/rec/journals/corr/ChlebikovaC13"}, "url":"URL#4252837" }, { "@score":"1", "@id":"4252851", "info":{"authors":{"author":[{"@pid":"115/9072","text":"Farhana Murtaza Choudhury"},{"@pid":"46/2884","text":"Mohammed Eunus Ali"},{"@pid":"115/9011","text":"Sarah Masud"},{"@pid":"85/6293","text":"Suman Nath"},{"@pid":"136/5957","text":"Ishat E. Rabban"}]},"title":"Scalable Visibility Color Map Construction in Spatial Databases.","venue":"CoRR","volume":"abs/1310.7297","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoudhuryAMNR13","ee":"http://arxiv.org/abs/1310.7297","url":"https://dblp.org/rec/journals/corr/ChoudhuryAMNR13"}, "url":"URL#4252851" }, { "@score":"1", "@id":"4252854", "info":{"authors":{"author":[{"@pid":"77/3439","text":"Richard Chow"},{"@pid":"55/2789","text":"Hongxia Jin"},{"@pid":"17/7457","text":"Bart P. Knijnenburg"},{"@pid":"73/4197","text":"Gökay Saldamli"}]},"title":"Differential Data Analysis for Recommender Systems.","venue":"CoRR","volume":"abs/1310.0894","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChowJKS13","ee":"http://arxiv.org/abs/1310.0894","url":"https://dblp.org/rec/journals/corr/ChowJKS13"}, "url":"URL#4252854" }, { "@score":"1", "@id":"4252860", "info":{"authors":{"author":[{"@pid":"130/9745","text":"Ananya Christman"},{"@pid":"136/5664","text":"William Forcier"}]},"title":"Maximizing Revenues for Online-Dial-a-Ride.","venue":"CoRR","volume":"abs/1310.7232","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChristmanF13","ee":"http://arxiv.org/abs/1310.7232","url":"https://dblp.org/rec/journals/corr/ChristmanF13"}, "url":"URL#4252860" }, { "@score":"1", "@id":"4252871", "info":{"authors":{"author":[{"@pid":"06/11152","text":"Hye Won Chung"},{"@pid":"42/5459-1","text":"Saikat Guha 0001"},{"@pid":"44/1753","text":"Lizhong Zheng"}]},"title":"Superadditivity of Quantum Channel Coding Rate with Finite Blocklength Quantum Measurements.","venue":"CoRR","volume":"abs/1310.3793","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChungGZ13","ee":"http://arxiv.org/abs/1310.3793","url":"https://dblp.org/rec/journals/corr/ChungGZ13"}, "url":"URL#4252871" }, { "@score":"1", "@id":"4252875", "info":{"authors":{"author":[{"@pid":"50/1930","text":"Vincenzo Ciancia"},{"@pid":"120/2179","text":"Matteo Sammartino"}]},"title":"A decidable class of (nominal) omega-regular languages over an infinite alphabet.","venue":"CoRR","volume":"abs/1310.3945","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CianciaS13","ee":"http://arxiv.org/abs/1310.3945","url":"https://dblp.org/rec/journals/corr/CianciaS13"}, "url":"URL#4252875" }, { "@score":"1", "@id":"4252877", "info":{"authors":{"author":[{"@pid":"99/6306","text":"Josef Cibulka"},{"@pid":"54/3104","text":"Pu Gao"},{"@pid":"22/2974","text":"Marek Krcál"},{"@pid":"91/8602","text":"Tomás Valla"},{"@pid":"08/4029-1","text":"Pavel Valtr 0001"}]},"title":"On the Geometric Ramsey Number of Outerplanar Graphs.","venue":"CoRR","volume":"abs/1310.7004","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CibulkaGKVV13","ee":"http://arxiv.org/abs/1310.7004","url":"https://dblp.org/rec/journals/corr/CibulkaGKVV13"}, "url":"URL#4252877" }, { "@score":"1", "@id":"4252879", "info":{"authors":{"author":[{"@pid":"39/4100","text":"Paolo Ciccarese"},{"@pid":"36/354","text":"Stian Soiland-Reyes"},{"@pid":"75/4","text":"Tim Clark"}]},"title":"Web Annotation as a First Class Object.","venue":"CoRR","volume":"abs/1310.6555","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CiccareseSC13","ee":"http://arxiv.org/abs/1310.6555","url":"https://dblp.org/rec/journals/corr/CiccareseSC13"}, "url":"URL#4252879" }, { "@score":"1", "@id":"4252880", "info":{"authors":{"author":[{"@pid":"66/7558","text":"Marcelo Cicconet"},{"@pid":"76/1145","text":"Davi Geiger"}]},"title":"A Dynamic Programming Solution to the Monotonic Path of Minimal Cost in a 3-Rows Matrix.","venue":"CoRR","volume":"abs/1310.4541","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CicconetG13","ee":"http://arxiv.org/abs/1310.4541","url":"https://dblp.org/rec/journals/corr/CicconetG13"}, "url":"URL#4252880" }, { "@score":"1", "@id":"4252883", "info":{"authors":{"author":[{"@pid":"13/5961","text":"Alessandro Cimatti"},{"@pid":"19/3686","text":"Alberto Griggio"},{"@pid":"59/7880","text":"Sergio Mover"},{"@pid":"t/StefanoTonetta","text":"Stefano Tonetta"}]},"title":"IC3 Modulo Theories via Implicit Predicate Abstraction.","venue":"CoRR","volume":"abs/1310.6847","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CimattiGMT13","ee":"http://arxiv.org/abs/1310.6847","url":"https://dblp.org/rec/journals/corr/CimattiGMT13"}, "url":"URL#4252883" }, { "@score":"1", "@id":"4252906", "info":{"authors":{"author":[{"@pid":"15/9061","text":"Jason Cloud"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"},{"@pid":"m/MurielMedard","text":"Muriel Médard"}]},"title":"Network Coded TCP (CTCP) Performance over Satellite Networks.","venue":"CoRR","volume":"abs/1310.6635","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CloudLM13","ee":"http://arxiv.org/abs/1310.6635","url":"https://dblp.org/rec/journals/corr/CloudLM13"}, "url":"URL#4252906" }, { "@score":"1", "@id":"4252907", "info":{"authors":{"author":[{"@pid":"136/6094","text":"James R. Clough"},{"@pid":"136/5808","text":"Jamie Gollings"},{"@pid":"136/6007","text":"Tamar V. Loach"},{"@pid":"136/5672","text":"Tim S. Evans"}]},"title":"Transitive Reduction of Citation Networks.","venue":"CoRR","volume":"abs/1310.8224","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CloughGLE13","ee":"http://arxiv.org/abs/1310.8224","url":"https://dblp.org/rec/journals/corr/CloughGLE13"}, "url":"URL#4252907" }, { "@score":"1", "@id":"4252910", "info":{"authors":{"author":[{"@pid":"136/5888","text":"Manfred Cochefert"},{"@pid":"30/10257-1","text":"Jean-François Couturier 0001"},{"@pid":"06/6306","text":"Petr A. Golovach"},{"@pid":"k/DieterKratsch","text":"Dieter Kratsch"},{"@pid":"18/5531","text":"Daniël Paulusma"}]},"title":"Parameterized Algorithms for Finding Square Roots.","venue":"CoRR","volume":"abs/1310.5469","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CochefertCGKP13","ee":"http://arxiv.org/abs/1310.5469","url":"https://dblp.org/rec/journals/corr/CochefertCGKP13"}, "url":"URL#4252910" }, { "@score":"1", "@id":"4252912", "info":{"authors":{"author":[{"@pid":"118/4182","text":"Moreno I. Coco"},{"@pid":"28/5334","text":"Rick Dale"}]},"title":"Cross-Recurrence Quantification Analysis of Categorical and Continuous Time Series: an R package.","venue":"CoRR","volume":"abs/1310.0201","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CocoD13","ee":"http://arxiv.org/abs/1310.0201","url":"https://dblp.org/rec/journals/corr/CocoD13"}, "url":"URL#4252912" }, { "@score":"1", "@id":"4252921", "info":{"authors":{"author":[{"@pid":"136/5814","text":"Vincent Cohen-Addad"},{"@pid":"55/6705","text":"Michel Habib"},{"@pid":"57/6313","text":"Fabien de Montgolfier"}]},"title":"Algorithmic Aspects of Switch Cographs.","venue":"CoRR","volume":"abs/1310.1012","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cohen-AddadHM13","ee":"http://arxiv.org/abs/1310.1012","url":"https://dblp.org/rec/journals/corr/Cohen-AddadHM13"}, "url":"URL#4252921" }, { "@score":"1", "@id":"4252929", "info":{"authors":{"author":[{"@pid":"40/1039","text":"Edith Cohen"},{"@pid":"06/894","text":"Amos Fiat"},{"@pid":"48/3950","text":"Haim Kaplan"},{"@pid":"93/5413","text":"Liam Roditty"}]},"title":"A Labeling Approach to Incremental Cycle Detection.","venue":"CoRR","volume":"abs/1310.8381","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenFKR13","ee":"http://arxiv.org/abs/1310.8381","url":"https://dblp.org/rec/journals/corr/CohenFKR13"}, "url":"URL#4252929" }, { "@score":"1", "@id":"4252932", "info":{"authors":{"author":[{"@pid":"46/9257","text":"Raphael Cohen"},{"@pid":"136/5996","text":"David Miculescu"},{"@pid":"136/5815","text":"Kevin Reilley"},{"@pid":"136/5851","text":"Mehrdad Pakmehr"},{"@pid":"76/3866","text":"Eric Feron"}]},"title":"Online Performance Optimization of a DC Motor Driving a Variable Pitch Propeller.","venue":"CoRR","volume":"abs/1310.0133","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenMRPF13","ee":"http://arxiv.org/abs/1310.0133","url":"https://dblp.org/rec/journals/corr/CohenMRPF13"}, "url":"URL#4252932" }, { "@score":"1", "@id":"4252935", "info":{"authors":{"author":{"@pid":"63/522","text":"Amin Coja-Oghlan"}},"title":"Random regular k-SAT.","venue":"CoRR","volume":"abs/1310.2728","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Coja-Oghlan13","ee":"http://arxiv.org/abs/1310.2728","url":"https://dblp.org/rec/journals/corr/Coja-Oghlan13"}, "url":"URL#4252935" }, { "@score":"1", "@id":"4252939", "info":{"authors":{"author":[{"@pid":"52/11265","text":"Marco Baity-Jesi"},{"@pid":"139/0281","text":"Rachel A. Baños"},{"@pid":"33/2997","text":"Andres Cruz Flor"},{"@pid":"99/913","text":"Luis Antonio Fernández"},{"@pid":"47/11269","text":"José Miguel Gil-Narvión"},{"@pid":"94/2732","text":"Antonio Gordillo-Guerrero"},{"@pid":"84/3509","text":"David Iñiguez"},{"@pid":"06/4042","text":"Andrea Maiorano"},{"@pid":"88/5952","text":"Filippo Mantovani"},{"@pid":"32/3503","text":"Enzo Marinari"},{"@pid":"89/6861","text":"Victor Martin-Mayor"},{"@pid":"154/7398","text":"Jorge Monforte-Garcia"},{"@pid":"61/5071","text":"Antonio Muñoz Sudupe"},{"@pid":"61/1493","text":"Denis Navarro"},{"@pid":"39/2199","text":"Giorgio Parisi"},{"@pid":"14/6424","text":"Sergio Perez Gaviro"},{"@pid":"12/8771","text":"Marcello Pivanti"},{"@pid":"79/6220","text":"Federico Ricci-Tersenghi"},{"@pid":"17/2962","text":"Juan Jesus Ruiz-Lorenzo"},{"@pid":"01/5335","text":"Sebastiano Fabio Schifano"},{"@pid":"82/11266","text":"Beatriz Seoane"},{"@pid":"39/4646","text":"Alfonso Tarancón"},{"@pid":"71/4546","text":"Raffaele Tripiccione"},{"@pid":"78/3984","text":"David Yllanes"}]},"title":"Janus II: a new generation application-driven computer for spin-system simulations.","venue":"CoRR","volume":"abs/1310.1032","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Collaboration13","ee":"http://arxiv.org/abs/1310.1032","url":"https://dblp.org/rec/journals/corr/Collaboration13"}, "url":"URL#4252939" }, { "@score":"1", "@id":"4252940", "info":{"authors":{"author":[{"@pid":"78/11347","text":"Olivier Collier"},{"@pid":"87/1594","text":"Arnak S. Dalalyan"}]},"title":"Minimax rates in permutation estimation for feature matching.","venue":"CoRR","volume":"abs/1310.4661","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CollierD13","ee":"http://arxiv.org/abs/1310.4661","url":"https://dblp.org/rec/journals/corr/CollierD13"}, "url":"URL#4252940" }, { "@score":"1", "@id":"4252947", "info":{"authors":{"author":[{"@pid":"64/2592","text":"Giulio Coluccia"},{"@pid":"127/0155","text":"Simeon Kamdem Kuiteing"},{"@pid":"65/2893","text":"Andrea Abrardo"},{"@pid":"06/4558","text":"Mauro Barni"},{"@pid":"81/5607","text":"Enrico Magli"}]},"title":"Progressive Compressed Sensing and Reconstruction of Multidimensional Signals Using Hybrid Transform/Prediction Sparsity Model.","venue":"CoRR","volume":"abs/1310.1266","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ColucciaKABM13","ee":"http://arxiv.org/abs/1310.1266","url":"https://dblp.org/rec/journals/corr/ColucciaKABM13"}, "url":"URL#4252947" }, { "@score":"1", "@id":"4252948", "info":{"authors":{"author":[{"@pid":"64/2592","text":"Giulio Coluccia"},{"@pid":"81/5607","text":"Enrico Magli"}]},"title":"A Novel Progressive Image Scanning and Reconstruction Scheme based on Compressed Sensing and Linear Prediction.","venue":"CoRR","volume":"abs/1310.1259","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ColucciaM13","ee":"http://arxiv.org/abs/1310.1259","url":"https://dblp.org/rec/journals/corr/ColucciaM13"}, "url":"URL#4252948" }, { "@score":"1", "@id":"4252949", "info":{"authors":{"author":[{"@pid":"64/2592","text":"Giulio Coluccia"},{"@pid":"136/4988","text":"Diego Valsesia"},{"@pid":"81/5607","text":"Enrico Magli"}]},"title":"Smoothness-Constrained Image Recovery from Block-Based Random Projections.","venue":"CoRR","volume":"abs/1310.7813","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ColucciaVM13","ee":"http://arxiv.org/abs/1310.7813","url":"https://dblp.org/rec/journals/corr/ColucciaVM13"}, "url":"URL#4252949" }, { "@score":"1", "@id":"4252956", "info":{"authors":{"author":[{"@pid":"04/848","text":"Marco Congedo"},{"@pid":"56/8509","text":"Alexandre Barachant"},{"@pid":"136/5863","text":"Anton Andreev"}]},"title":"A New Generation of Brain-Computer Interface Based on Riemannian Geometry.","venue":"CoRR","volume":"abs/1310.8115","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CongedoBA13","ee":"http://arxiv.org/abs/1310.8115","url":"https://dblp.org/rec/journals/corr/CongedoBA13"}, "url":"URL#4252956" }, { "@score":"1", "@id":"4252966", "info":{"authors":{"author":[{"@pid":"136/5783","text":"Jeff Cooper"},{"@pid":"64/8015","text":"Kunal Dutta"},{"@pid":"11/3","text":"Dhruv Mubayi"}]},"title":"Counting independent sets in hypergraphs.","venue":"CoRR","volume":"abs/1310.6672","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CooperDM13","ee":"http://arxiv.org/abs/1310.6672","url":"https://dblp.org/rec/journals/corr/CooperDM13"}, "url":"URL#4252966" }, { "@score":"1", "@id":"4252967", "info":{"authors":{"author":[{"@pid":"94/2872","text":"Jukka Corander"},{"@pid":"j/TomiJanhunen","text":"Tomi Janhunen"},{"@pid":"65/3601","text":"Jussi Rintanen"},{"@pid":"131/6489","text":"Henrik J. Nyman"},{"@pid":"136/5949","text":"Johan Pensar"}]},"title":"Learning Chordal Markov Networks by Constraint Satisfaction.","venue":"CoRR","volume":"abs/1310.0927","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CoranderJRNP13","ee":"http://arxiv.org/abs/1310.0927","url":"https://dblp.org/rec/journals/corr/CoranderJRNP13"}, "url":"URL#4252967" }, { "@score":"1", "@id":"4252971", "info":{"authors":{"author":[{"@pid":"c/GrahamCormode","text":"Graham Cormode"},{"@pid":"m/SMuthukrishnan","text":"S. Muthukrishnan 0001"},{"@pid":"40/11207","text":"Jinyun Yan"}]},"title":"First Author Advantage: Citation Labeling in Research.","venue":"CoRR","volume":"abs/1310.1968","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CormodeMY13","ee":"http://arxiv.org/abs/1310.1968","url":"https://dblp.org/rec/journals/corr/CormodeMY13"}, "url":"URL#4252971" }, { "@score":"1", "@id":"4252973", "info":{"authors":{"author":[{"@pid":"122/3039","text":"Kamiel Cornelissen"},{"@pid":"78/11131","text":"Ruben Hoeksma"},{"@pid":"m/BodoManthey","text":"Bodo Manthey"},{"@pid":"n/NSNarayanaswamy","text":"N. S. Narayanaswamy"},{"@pid":"136/5838","text":"C. S. Rahul 0001"}]},"title":"Approximability of Connected Factors.","venue":"CoRR","volume":"abs/1310.2387","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CornelissenHMNR13","ee":"http://arxiv.org/abs/1310.2387","url":"https://dblp.org/rec/journals/corr/CornelissenHMNR13"}, "url":"URL#4252973" }, { "@score":"1", "@id":"4252977", "info":{"authors":{"author":[{"@pid":"98/1125","text":"José R. Correa"},{"@pid":"22/9795","text":"Omar Larré"},{"@pid":"84/8318","text":"José A. Soto"}]},"title":"TSP Tours in Cubic Graphs: Beyond 4/3.","venue":"CoRR","volume":"abs/1310.1896","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CorreaLS13","ee":"http://arxiv.org/abs/1310.1896","url":"https://dblp.org/rec/journals/corr/CorreaLS13"}, "url":"URL#4252977" }, { "@score":"1", "@id":"4252981", "info":{"authors":{"author":[{"@pid":"77/5783","text":"Corinna Cortes"},{"@pid":"131/6693","text":"Spencer Greenberg"},{"@pid":"03/5448","text":"Mehryar Mohri"}]},"title":"Relative Deviation Learning Bounds and Generalization with Unbounded Loss Functions.","venue":"CoRR","volume":"abs/1310.5796","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CortesGM13","ee":"http://arxiv.org/abs/1310.5796","url":"https://dblp.org/rec/journals/corr/CortesGM13"}, "url":"URL#4252981" }, { "@score":"1", "@id":"4252984", "info":{"authors":{"author":[{"@pid":"72/1797","text":"Daniel J. Costello Jr."},{"@pid":"35/3690","text":"Lara Dolecek"},{"@pid":"71/1882","text":"Thomas E. Fuja"},{"@pid":"39/4721","text":"Jörg Kliewer"},{"@pid":"60/1997","text":"David G. M. Mitchell"},{"@pid":"34/1787","text":"Roxana Smarandache"}]},"title":"Spatially Coupled Sparse Codes on Graphs - Theory and Practice.","venue":"CoRR","volume":"abs/1310.3724","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CostelloDFKMS13","ee":"http://arxiv.org/abs/1310.3724","url":"https://dblp.org/rec/journals/corr/CostelloDFKMS13"}, "url":"URL#4252984" }, { "@score":"1", "@id":"4252987", "info":{"authors":{"author":[{"@pid":"89/381","text":"Nicolas T. Courtois"},{"@pid":"78/4666","text":"Marek Grajek"},{"@pid":"136/5719","text":"Rahul Naik"}]},"title":"The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining.","venue":"CoRR","volume":"abs/1310.7935","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CourtoisGN13","ee":"http://arxiv.org/abs/1310.7935","url":"https://dblp.org/rec/journals/corr/CourtoisGN13"}, "url":"URL#4252987" }, { "@score":"1", "@id":"4252989", "info":{"authors":{"author":{"@pid":"58/2715","text":"Francisco M. Couto"}},"title":"CIDS country rankings: comparing documents and citations of USA, UK and China top researchers.","venue":"CoRR","volume":"abs/1310.5597","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Couto13","ee":"http://arxiv.org/abs/1310.5597","url":"https://dblp.org/rec/journals/corr/Couto13"}, "url":"URL#4252989" }, { "@score":"1", "@id":"4252992", "info":{"authors":{"author":[{"@pid":"40/4210","text":"Alain Couvreur"},{"@pid":"94/1801","text":"Ayoub Otmani"},{"@pid":"53/7044","text":"Jean-Pierre Tillich"}]},"title":"New Identities Relating Wild Goppa Codes.","venue":"CoRR","volume":"abs/1310.3202","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CouvreurOT13","ee":"http://arxiv.org/abs/1310.3202","url":"https://dblp.org/rec/journals/corr/CouvreurOT13"}, "url":"URL#4252992" }, { "@score":"1", "@id":"4253006", "info":{"authors":{"author":[{"@pid":"29/5053","text":"Regino Criado"},{"@pid":"125/3188","text":"Esther García"},{"@pid":"79/9306","text":"Francisco Pedroche"},{"@pid":"85/2562","text":"Miguel Romance"}]},"title":"Comparing rankings by means of competitivity graphs: structural properties and computation.","venue":"CoRR","volume":"abs/1310.6921","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CriadoGPR13a","ee":"http://arxiv.org/abs/1310.6921","url":"https://dblp.org/rec/journals/corr/CriadoGPR13a"}, "url":"URL#4253006" }, { "@score":"1", "@id":"4253014", "info":{"authors":{"author":[{"@pid":"22/7588","text":"Robert Crowston"},{"@pid":"35/4186-1","text":"Mark Jones 0001"},{"@pid":"23/11269","text":"Gabriele Muciaccia"},{"@pid":"03/601","text":"Geevarghese Philip"},{"@pid":"09/11533-1","text":"Ashutosh Rai 0001"},{"@pid":"11/5491","text":"Saket Saurabh 0001"}]},"title":"Polynomial Kernels for λ-extendible Properties Parameterized Above the Poljak-Turzík Bound.","venue":"CoRR","volume":"abs/1310.2928","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CrowstonJMPRS13","ee":"http://arxiv.org/abs/1310.2928","url":"https://dblp.org/rec/journals/corr/CrowstonJMPRS13"}, "url":"URL#4253014" }, { "@score":"1", "@id":"4253020", "info":{"authors":{"author":{"@pid":"73/347","text":"László Csirmaz"}},"title":"Using multiobjective optimization to map the entropy region of four random variables.","venue":"CoRR","volume":"abs/1310.4638","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Csirmaz13","ee":"http://arxiv.org/abs/1310.4638","url":"https://dblp.org/rec/journals/corr/Csirmaz13"}, "url":"URL#4253020" }, { "@score":"1", "@id":"4253021", "info":{"authors":{"author":{"@pid":"73/347","text":"László Csirmaz"}},"title":"Secret sharing on the $d$-dimensional cube.","venue":"CoRR","volume":"abs/1310.4640","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Csirmaz13a","ee":"http://arxiv.org/abs/1310.4640","url":"https://dblp.org/rec/journals/corr/Csirmaz13a"}, "url":"URL#4253021" }, { "@score":"1", "@id":"4253022", "info":{"authors":{"author":{"@pid":"73/347","text":"László Csirmaz"}},"title":"Gruppen secret sharing, or, how to share several secrets if you must?","venue":"CoRR","volume":"abs/1310.4652","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Csirmaz13b","ee":"http://arxiv.org/abs/1310.4652","url":"https://dblp.org/rec/journals/corr/Csirmaz13b"}, "url":"URL#4253022" }, { "@score":"1", "@id":"4253023", "info":{"authors":{"author":{"@pid":"73/347","text":"László Csirmaz"}},"title":"Probabilistic Infinite Secret Sharing.","venue":"CoRR","volume":"abs/1310.7423","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Csirmaz13c","ee":"http://arxiv.org/abs/1310.7423","url":"https://dblp.org/rec/journals/corr/Csirmaz13c"}, "url":"URL#4253023" }, { "@score":"1", "@id":"4253032", "info":{"authors":{"author":[{"@pid":"136/5709","text":"Qingpei Cui"},{"@pid":"42/5886","text":"Tong Ye"},{"@pid":"90/6037","text":"Tony Tong Lee"},{"@pid":"71/6601-3","text":"Wei Guo 0003"},{"@pid":"25/1659","text":"Weisheng Hu"}]},"title":"Stability and Delay Analysis of EPON Registration Protocol.","venue":"CoRR","volume":"abs/1310.1679","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CuiYLGH13","ee":"http://arxiv.org/abs/1310.1679","url":"https://dblp.org/rec/journals/corr/CuiYLGH13"}, "url":"URL#4253032" }, { "@score":"1", "@id":"4253037", "info":{"authors":{"author":[{"@pid":"03/1533","text":"Robert Cupec"},{"@pid":"01/7284","text":"Emmanuel Karlo Nyarko"},{"@pid":"95/271","text":"Damir Filko"},{"@pid":"174/8505","text":"Andrej Kitanov"},{"@pid":"45/903","text":"Ivan Petrovic"}]},"title":"Global Localization Based on 3D Planar Surface Segments.","venue":"CoRR","volume":"abs/1310.0314","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/CupecNFKP13","ee":"http://arxiv.org/abs/1310.0314","url":"https://dblp.org/rec/journals/corr/CupecNFKP13"}, "url":"URL#4253037" }, { "@score":"1", "@id":"4253046", "info":{"authors":{"author":[{"@pid":"94/8076","text":"Daniele D'Angeli"},{"@pid":"29/516","text":"Emanuele Rodaro"}]},"title":"Groups and Semigroups Defined by Colorings of Synchronizing Automata.","venue":"CoRR","volume":"abs/1310.5242","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DAngeliR13","ee":"http://arxiv.org/abs/1310.5242","url":"https://dblp.org/rec/journals/corr/DAngeliR13"}, "url":"URL#4253046" }, { "@score":"1", "@id":"4253049", "info":{"authors":{"author":[{"@pid":"136/6035","text":"Ajayeb Abu Dabbes"},{"@pid":"36/3638","text":"Faten F. Kharbat"}]},"title":"Mining The Relationship Between Demographic Variables And Brand Associations.","venue":"CoRR","volume":"abs/1310.2079","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DabbesK13","ee":"http://arxiv.org/abs/1310.2079","url":"https://dblp.org/rec/journals/corr/DabbesK13"}, "url":"URL#4253049" }, { "@score":"1", "@id":"4253058", "info":{"authors":{"author":[{"@pid":"08/10346","text":"Liyun Dai"},{"@pid":"50/5083","text":"Ting Gan"},{"@pid":"07/587","text":"Bican Xia"},{"@pid":"63/1911","text":"Naijun Zhan"}]},"title":"Barrier Certificates Revisited.","venue":"CoRR","volume":"abs/1310.6481","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaiGXZ13","ee":"http://arxiv.org/abs/1310.6481","url":"https://dblp.org/rec/journals/corr/DaiGXZ13"}, "url":"URL#4253058" }, { "@score":"1", "@id":"4253064", "info":{"authors":{"author":[{"@pid":"33/5228","text":"Hong-Ning Dai"},{"@pid":"w/RaymondChiWingWong","text":"Raymond Chi-Wing Wong"},{"@pid":"98/3940","text":"Qinglin Zhao"}]},"title":"Multi-channel Wireless Networks with Infrastructure Support: Capacity and Delay.","venue":"CoRR","volume":"abs/1310.1530","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaiWZ13","ee":"http://arxiv.org/abs/1310.1530","url":"https://dblp.org/rec/journals/corr/DaiWZ13"}, "url":"URL#4253064" }, { "@score":"1", "@id":"4253069", "info":{"authors":{"author":[{"@pid":"d/MirelaDamian","text":"Mirela Damian"},{"@pid":"d/ErikDDemaine","text":"Erik D. Demaine"},{"@pid":"12/3538","text":"Robin Y. Flatland"}]},"title":"Unfolding Orthogrids with Constant Refinement.","venue":"CoRR","volume":"abs/1310.4561","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DamianDF13","ee":"http://arxiv.org/abs/1310.4561","url":"https://dblp.org/rec/journals/corr/DamianDF13"}, "url":"URL#4253069" }, { "@score":"1", "@id":"4253073", "info":{"authors":{"author":[{"@pid":"41/3295","text":"Fred Daneshgaran"},{"@pid":"11/5880","text":"Marina Mondin"}]},"title":"Impact of Interleaver Pruning on Properties of Underlying Permutations.","venue":"CoRR","volume":"abs/1310.3416","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaneshgaranM13","ee":"http://arxiv.org/abs/1310.3416","url":"https://dblp.org/rec/journals/corr/DaneshgaranM13"}, "url":"URL#4253073" }, { "@score":"1", "@id":"4253074", "info":{"authors":{"author":[{"@pid":"50/6845","text":"Varsha Dani"},{"@pid":"k/ValerieKing","text":"Valerie King"},{"@pid":"29/7674","text":"Mahnush Movahedi"},{"@pid":"72/2042","text":"Jared Saia"}]},"title":"Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation.","venue":"CoRR","volume":"abs/1310.3486","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaniKMS13","ee":"http://arxiv.org/abs/1310.3486","url":"https://dblp.org/rec/journals/corr/DaniKMS13"}, "url":"URL#4253074" }, { "@score":"1", "@id":"4253079", "info":{"authors":{"author":[{"@pid":"10/1897","text":"Tilman Dannert"},{"@pid":"136/5698","text":"Andreas Marek"},{"@pid":"67/5381","text":"Markus Rampp"}]},"title":"Porting Large HPC Applications to GPU Clusters: The Codes GENE and VERTEX.","venue":"CoRR","volume":"abs/1310.1485","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DannertMR13","ee":"http://arxiv.org/abs/1310.1485","url":"https://dblp.org/rec/journals/corr/DannertMR13"}, "url":"URL#4253079" }, { "@score":"1", "@id":"4253082", "info":{"authors":{"author":[{"@pid":"89/9222","text":"Ronen Dar"},{"@pid":"97/1366","text":"Meir Feder"},{"@pid":"132/9418","text":"Antonio Mecozzi"},{"@pid":"60/10966","text":"Mark Shtaif"}]},"title":"Time varying ISI model for nonlinear interference noise.","venue":"CoRR","volume":"abs/1310.6132","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DarFMS13a","ee":"http://arxiv.org/abs/1310.6132","url":"https://dblp.org/rec/journals/corr/DarFMS13a"}, "url":"URL#4253082" }, { "@score":"1", "@id":"4253093", "info":{"authors":{"author":{"@pid":"87/5523","text":"Rajib K. Das"}},"title":"Eccentricity of the nodes of OTIS-cube and Enhanced OTIS-cube.","venue":"CoRR","volume":"abs/1310.7376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Das13","ee":"http://arxiv.org/abs/1310.7376","url":"https://dblp.org/rec/journals/corr/Das13"}, "url":"URL#4253093" }, { "@score":"1", "@id":"4253095", "info":{"authors":{"author":[{"@pid":"68/6940","text":"Tamal Das"},{"@pid":"94/8649","text":"Marcel Caria"},{"@pid":"30/1610","text":"Admela Jukan"},{"@pid":"00/1956","text":"Marco Hoffmann"}]},"title":"A Techno-economic Analysis of Network Migration to Software-Defined Networking.","venue":"CoRR","volume":"abs/1310.0216","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DasCJH13","ee":"http://arxiv.org/abs/1310.0216","url":"https://dblp.org/rec/journals/corr/DasCJH13"}, "url":"URL#4253095" }, { "@score":"1", "@id":"4253112", "info":{"authors":{"author":[{"@pid":"136/5836","text":"Priyanka Dash"},{"@pid":"136/5837","text":"Ranjita Rout"},{"@pid":"136/5868","text":"Satya Bhusan Pratihari"},{"@pid":"136/6106","text":"Sanjay Kumar Padhi"}]},"title":"Review on Fragment Allocation by using Clustering Technique in Distributed Database System.","venue":"CoRR","volume":"abs/1310.1190","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DashRPP13","ee":"http://arxiv.org/abs/1310.1190","url":"https://dblp.org/rec/journals/corr/DashRPP13"}, "url":"URL#4253112" }, { "@score":"1", "@id":"4253124", "info":{"authors":{"author":{"@pid":"16/2975","text":"Ernest Davis"}},"title":"The Relevance of Proofs of the Rationality of Probability Theory to Automated Reasoning and Cognitive Models.","venue":"CoRR","volume":"abs/1310.1328","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Davis13","ee":"http://arxiv.org/abs/1310.1328","url":"https://dblp.org/rec/journals/corr/Davis13"}, "url":"URL#4253124" }, { "@score":"1", "@id":"4253126", "info":{"authors":{"author":[{"@pid":"32/9762","text":"Sergio M. Davis"},{"@pid":"136/6069","text":"Yasmín Navarrete"},{"@pid":"45/7432","text":"Gonzalo Gutiérrez"}]},"title":"A maximum entropy model for opinions in social groups.","venue":"CoRR","volume":"abs/1310.0446","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DavisNG13","ee":"http://arxiv.org/abs/1310.0446","url":"https://dblp.org/rec/journals/corr/DavisNG13"}, "url":"URL#4253126" }, { "@score":"1", "@id":"4253127", "info":{"authors":{"author":[{"@pid":"134/9694","text":"Peter Davison"},{"@pid":"96/4636","text":"Naomi Ehrich Leonard"},{"@pid":"21/4206","text":"Alex Olshevsky"},{"@pid":"134/9782","text":"Michael Schwemmer"}]},"title":"Nonuniform Line Coverage from Noisy Scalar Measurements.","venue":"CoRR","volume":"abs/1310.4188","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DavisonLOS13","ee":"http://arxiv.org/abs/1310.4188","url":"https://dblp.org/rec/journals/corr/DavisonLOS13"}, "url":"URL#4253127" }, { "@score":"1", "@id":"4253139", "info":{"authors":{"author":[{"@pid":"118/7174","text":"Abir De"},{"@pid":"52/6987","text":"Niloy Ganguly"},{"@pid":"c/SChakrabarti","text":"Soumen Chakrabarti"}]},"title":"Discriminative Link Prediction using Local Links, Node Features and Community Structure.","venue":"CoRR","volume":"abs/1310.4579","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeGC13","ee":"http://arxiv.org/abs/1310.4579","url":"https://dblp.org/rec/journals/corr/DeGC13"}, "url":"URL#4253139" }, { "@score":"1", "@id":"4253141", "info":{"authors":{"author":[{"@pid":"d/ThomasRDean","text":"Thomas R. Dean"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea Goldsmith"}]},"title":"Physical-Layer Cryptography Through Massive MIMO.","venue":"CoRR","volume":"abs/1310.1861","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeanG13","ee":"http://arxiv.org/abs/1310.1861","url":"https://dblp.org/rec/journals/corr/DeanG13"}, "url":"URL#4253141" }, { "@score":"1", "@id":"4253144", "info":{"authors":{"author":{"@pid":"69/3583","text":"Lukasz Debowski"}},"title":"A Preadapted Universal Switch Distribution for Testing Hilberg's Conjecture.","venue":"CoRR","volume":"abs/1310.8511","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Debowski13","ee":"http://arxiv.org/abs/1310.8511","url":"https://dblp.org/rec/journals/corr/Debowski13"}, "url":"URL#4253144" }, { "@score":"1", "@id":"4253149", "info":{"authors":{"author":[{"@pid":"70/312","text":"Ofer Dekel"},{"@pid":"53/2896","text":"Jian Ding"},{"@pid":"12/10044","text":"Tomer Koren"},{"@pid":"31/3175","text":"Yuval Peres"}]},"title":"Bandits with Switching Costs: T{2/3} Regret.","venue":"CoRR","volume":"abs/1310.2997","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DekelDKP13","ee":"http://arxiv.org/abs/1310.2997","url":"https://dblp.org/rec/journals/corr/DekelDKP13"}, "url":"URL#4253149" }, { "@score":"1", "@id":"4253161", "info":{"authors":{"author":[{"@pid":"136/6126","text":"Pinar Celebi Demirarslan"},{"@pid":"61/2390","text":"Ivan Soprunov"}]},"title":"On dual toric complete intersection codes.","venue":"CoRR","volume":"abs/1310.5061","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DemirarslanS13","ee":"http://arxiv.org/abs/1310.5061","url":"https://dblp.org/rec/journals/corr/DemirarslanS13"}, "url":"URL#4253161" }, { "@score":"1", "@id":"4253163", "info":{"authors":{"author":[{"@pid":"129/1627","text":"Ömer Demirel"},{"@pid":"85/3261","text":"Ihor Smal"},{"@pid":"93/6561","text":"Wiro J. Niessen"},{"@pid":"m/ErikHWMeijering","text":"Erik Meijering"},{"@pid":"30/5647","text":"Ivo F. Sbalzarini"}]},"title":"PPF - A Parallel Particle Filtering Library.","venue":"CoRR","volume":"abs/1310.5045","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DemirelSNMS13","ee":"http://arxiv.org/abs/1310.5045","url":"https://dblp.org/rec/journals/corr/DemirelSNMS13"}, "url":"URL#4253163" }, { "@score":"1", "@id":"4253164", "info":{"authors":{"author":[{"@pid":"129/1627","text":"Ömer Demirel"},{"@pid":"85/3261","text":"Ihor Smal"},{"@pid":"93/6561","text":"Wiro J. Niessen"},{"@pid":"m/ErikHWMeijering","text":"Erik Meijering"},{"@pid":"30/5647","text":"Ivo F. Sbalzarini"}]},"title":"Piecewise Constant Sequential Importance Sampling for Fast Particle Filtering.","venue":"CoRR","volume":"abs/1310.5541","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DemirelSNMS13a","ee":"http://arxiv.org/abs/1310.5541","url":"https://dblp.org/rec/journals/corr/DemirelSNMS13a"}, "url":"URL#4253164" }, { "@score":"1", "@id":"4253167", "info":{"authors":{"author":[{"@pid":"75/10722","text":"Xinyang Deng"},{"@pid":"66/3604-1","text":"Yong Deng 0001"}]},"title":"A short note on the axiomatic requirements of uncertainty measure.","venue":"CoRR","volume":"abs/1310.2098","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DengD13","ee":"http://arxiv.org/abs/1310.2098","url":"https://dblp.org/rec/journals/corr/DengD13"}, "url":"URL#4253167" }, { "@score":"1", "@id":"4253170", "info":{"authors":{"author":[{"@pid":"48/8092","text":"Misha Denil"},{"@pid":"56/8127","text":"David Matheson"},{"@pid":"42/631","text":"Nando de Freitas"}]},"title":"Narrowing the Gap: Random Forests In Theory and In Practice.","venue":"CoRR","volume":"abs/1310.1415","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DenilMF13","ee":"http://arxiv.org/abs/1310.1415","url":"https://dblp.org/rec/journals/corr/DenilMF13"}, "url":"URL#4253170" }, { "@score":"1", "@id":"4253175", "info":{"authors":{"author":[{"@pid":"58/1750","text":"Louise A. Dennis"},{"@pid":"f/MichaelFisher","text":"Michael Fisher 0001"},{"@pid":"99/7999","text":"Nicholas Lincoln"},{"@pid":"73/6140","text":"Alexei Lisitsa 0001"},{"@pid":"06/7141","text":"Sandor M. Veres"}]},"title":"Practical Verification of Decision-Making in Agent-Based Autonomous Systems.","venue":"CoRR","volume":"abs/1310.2431","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DennisFLLV13","ee":"http://arxiv.org/abs/1310.2431","url":"https://dblp.org/rec/journals/corr/DennisFLLV13"}, "url":"URL#4253175" }, { "@score":"1", "@id":"4253184", "info":{"authors":{"author":[{"@pid":"136/5621","text":"Alban Derrien"},{"@pid":"84/3969","text":"Thierry Petit"}]},"title":"The Energetic Reasoning Checker Revisited.","venue":"CoRR","volume":"abs/1310.5564","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DerrienP13","ee":"http://arxiv.org/abs/1310.5564","url":"https://dblp.org/rec/journals/corr/DerrienP13"}, "url":"URL#4253184" }, { "@score":"1", "@id":"4253193", "info":{"authors":{"author":[{"@pid":"16/11059","text":"Xavier Devroey"},{"@pid":"73/10839","text":"Maxime Cordy"},{"@pid":"65/5965","text":"Gilles Perrouin"},{"@pid":"27/3416","text":"Pierre-Yves Schobbens"},{"@pid":"52/579","text":"Axel Legay"},{"@pid":"83/3086","text":"Patrick Heymans"}]},"title":"Towards Statistical Prioritization for Software Product Lines Testing.","venue":"CoRR","volume":"abs/1310.2474","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DevroeyCPSLH13","ee":"http://arxiv.org/abs/1310.2474","url":"https://dblp.org/rec/journals/corr/DevroeyCPSLH13"}, "url":"URL#4253193" }, { "@score":"1", "@id":"4253213", "info":{"authors":{"author":[{"@pid":"117/5834","text":"Alexander Dibert"},{"@pid":"73/347","text":"László Csirmaz"}]},"title":"Infinite Secret Sharing - Examples.","venue":"CoRR","volume":"abs/1310.7418","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DibertC13","ee":"http://arxiv.org/abs/1310.7418","url":"https://dblp.org/rec/journals/corr/DibertC13"}, "url":"URL#4253213" }, { "@score":"1", "@id":"4253225", "info":{"authors":{"author":[{"@pid":"127/6567","text":"Weicong Ding"},{"@pid":"61/5637","text":"Prakash Ishwar"},{"@pid":"43/8108","text":"Mohammad H. Rohban"},{"@pid":"67/4721","text":"Venkatesh Saligrama"}]},"title":"Necessary and Sufficient Conditions for Novel Word Detection in Separable Topic Models.","venue":"CoRR","volume":"abs/1310.7994","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DingIRS13","ee":"http://arxiv.org/abs/1310.7994","url":"https://dblp.org/rec/journals/corr/DingIRS13"}, "url":"URL#4253225" }, { "@score":"1", "@id":"4253231", "info":{"authors":{"author":[{"@pid":"120/6996","text":"Ni Ding"},{"@pid":"28/2887","text":"Parastoo Sadeghi"},{"@pid":"56/6217","text":"Rodney A. Kennedy"}]},"title":"Structured Optimal Transmission Control in Network-coded Two-way Relay Channels.","venue":"CoRR","volume":"abs/1310.7679","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DingSK13","ee":"http://arxiv.org/abs/1310.7679","url":"https://dblp.org/rec/journals/corr/DingSK13"}, "url":"URL#4253231" }, { "@score":"1", "@id":"4253235", "info":{"authors":{"author":[{"@pid":"61/3094","text":"Cunsheng Ding"},{"@pid":"81/6111","text":"Zhengchun Zhou"}]},"title":"Binary Cyclic Codes from Explicit Polynomials over $\\gf(2m)$.","venue":"CoRR","volume":"abs/1310.1442","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DingZ13","ee":"http://arxiv.org/abs/1310.1442","url":"https://dblp.org/rec/journals/corr/DingZ13"}, "url":"URL#4253235" }, { "@score":"1", "@id":"4253241", "info":{"authors":{"author":[{"@pid":"18/3891","text":"Irit Dinur"},{"@pid":"59/254","text":"David Steurer"},{"@pid":"94/6173","text":"Thomas Vidick"}]},"title":"A parallel repetition theorem for entangled projection games.","venue":"CoRR","volume":"abs/1310.4113","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DinurSV13","ee":"http://arxiv.org/abs/1310.4113","url":"https://dblp.org/rec/journals/corr/DinurSV13"}, "url":"URL#4253241" }, { "@score":"1", "@id":"4253249", "info":{"authors":{"author":[{"@pid":"v/HansPvanDitmarsch","text":"Hans van Ditmarsch"},{"@pid":"29/1679","text":"Tim French 0002"},{"@pid":"86/3728","text":"Fernando R. Velázquez-Quesada"},{"@pid":"87/10270","text":"Yi Nicholas Wang"}]},"title":"Knowledge, Awareness, and Bisimulation.","venue":"CoRR","volume":"abs/1310.6410","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DitmarschFVW13","ee":"http://arxiv.org/abs/1310.6410","url":"https://dblp.org/rec/journals/corr/DitmarschFVW13"}, "url":"URL#4253249" }, { "@score":"1", "@id":"4253250", "info":{"authors":{"author":[{"@pid":"v/HansPvanDitmarsch","text":"Hans van Ditmarsch"},{"@pid":"55/5701","text":"Jérôme Lang"},{"@pid":"99/7599","text":"Abdallah Saffidine"}]},"title":"Strategic Voting and the Logic of Knowledge.","venue":"CoRR","volume":"abs/1310.6436","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DitmarschLS13","ee":"http://arxiv.org/abs/1310.6436","url":"https://dblp.org/rec/journals/corr/DitmarschLS13"}, "url":"URL#4253250" }, { "@score":"1", "@id":"4253251", "info":{"authors":{"author":[{"@pid":"22/6375","text":"Ajit Arvind Diwan"},{"@pid":"41/4476","text":"Subir Kumar Ghosh"},{"@pid":"119/4808","text":"Bodhayan Roy"}]},"title":"Four-connected triangulations of planar point sets.","venue":"CoRR","volume":"abs/1310.1726","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DiwanGR13","ee":"http://arxiv.org/abs/1310.1726","url":"https://dblp.org/rec/journals/corr/DiwanGR13"}, "url":"URL#4253251" }, { "@score":"1", "@id":"4253277", "info":{"authors":{"author":[{"@pid":"01/5053","text":"Guilherme de Melo Baptista Domingues"},{"@pid":"96/5137","text":"Edmundo Albuquerque de Souza e Silva"},{"@pid":"l/RosaMMLeao","text":"Rosa Maria Meri Leão"},{"@pid":"44/4915","text":"Daniel Sadoc Menasché"}]},"title":"Enabling Information Centric Networks through Opportunistic Search, Routing and Caching.","venue":"CoRR","volume":"abs/1310.8258","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DominguesSLM13","ee":"http://arxiv.org/abs/1310.8258","url":"https://dblp.org/rec/journals/corr/DominguesSLM13"}, "url":"URL#4253277" }, { "@score":"1", "@id":"4253278", "info":{"authors":{"author":[{"@pid":"43/10771","text":"Jeff Donahue"},{"@pid":"19/2618","text":"Yangqing Jia"},{"@pid":"05/726","text":"Oriol Vinyals"},{"@pid":"45/10336","text":"Judy Hoffman"},{"@pid":"181/2597-14","text":"Ning Zhang 0014"},{"@pid":"136/5767","text":"Eric Tzeng"},{"@pid":"d/TrevorDarrell","text":"Trevor Darrell"}]},"title":"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.","venue":"CoRR","volume":"abs/1310.1531","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DonahueJVHZTD13","ee":"http://arxiv.org/abs/1310.1531","url":"https://dblp.org/rec/journals/corr/DonahueJVHZTD13"}, "url":"URL#4253278" }, { "@score":"1", "@id":"4253279", "info":{"authors":{"author":[{"@pid":"33/1182","text":"Ciro Donalek"},{"@pid":"136/5935","text":"Arun Kumar A."},{"@pid":"49/5738","text":"S. George Djorgovski"},{"@pid":"21/6335","text":"Ashish Mahabal"},{"@pid":"26/9829","text":"Matthew J. Graham"},{"@pid":"36/1644","text":"Thomas J. Fuchs"},{"@pid":"38/1805","text":"Michael J. Turmon"},{"@pid":"136/5899","text":"N. Sajeeth Philip"},{"@pid":"136/6078","text":"Michael Ting-Chang Yang"},{"@pid":"44/3784","text":"Giuseppe Longo"}]},"title":"Feature Selection Strategies for Classifying High Dimensional Astronomical Data Sets.","venue":"CoRR","volume":"abs/1310.1976","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DonalekADMGFTPYL13","ee":"http://arxiv.org/abs/1310.1976","url":"https://dblp.org/rec/journals/corr/DonalekADMGFTPYL13"}, "url":"URL#4253279" }, { "@score":"1", "@id":"4253282", "info":{"authors":{"author":[{"@pid":"27/1207","text":"Zheng Dong"},{"@pid":"27/2579","text":"Arjmand Samuel"}]},"title":"Touch-enabled Programming for the Lab of Things.","venue":"CoRR","volume":"abs/1310.0867","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongS13","ee":"http://arxiv.org/abs/1310.0867","url":"https://dblp.org/rec/journals/corr/DongS13"}, "url":"URL#4253282" }, { "@score":"1", "@id":"4253283", "info":{"authors":{"author":[{"@pid":"85/8620","text":"Gaogao Dong"},{"@pid":"42/5814","text":"Lixin Tian"},{"@pid":"38/9289","text":"Ruijin Du"},{"@pid":"24/5927","text":"Harry Eugene Stanley"}]},"title":"Robustness of Network of Networks with Interdependent and Interconnected links.","venue":"CoRR","volume":"abs/1310.5205","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongTDS13","ee":"http://arxiv.org/abs/1310.5205","url":"https://dblp.org/rec/journals/corr/DongTDS13"}, "url":"URL#4253283" }, { "@score":"1", "@id":"4253286", "info":{"authors":{"author":[{"@pid":"77/10263","text":"Vikas J. Dongre"},{"@pid":"11/9061","text":"Vijay H. Mankar"}]},"title":"Devnagari Handwritten Numeral Recognition using Geometric Features and Statistical Combination Classifier.","venue":"CoRR","volume":"abs/1310.5619","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongreM13a","ee":"http://arxiv.org/abs/1310.5619","url":"https://dblp.org/rec/journals/corr/DongreM13a"}, "url":"URL#4253286" }, { "@score":"1", "@id":"4253287", "info":{"authors":{"author":[{"@pid":"d/DavidLDonoho","text":"David L. Donoho"},{"@pid":"83/5094","text":"Andrea Montanari"}]},"title":"High Dimensional Robust M-Estimation: Asymptotic Variance via Approximate Message Passing.","venue":"CoRR","volume":"abs/1310.7320","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DonohoM13","ee":"http://arxiv.org/abs/1310.7320","url":"https://dblp.org/rec/journals/corr/DonohoM13"}, "url":"URL#4253287" }, { "@score":"1", "@id":"4253298", "info":{"authors":{"author":[{"@pid":"47/1135","text":"Pier Luigi Dragotti"},{"@pid":"39/6975","text":"Yue M. Lu"}]},"title":"On Sparse Representation in Fourier and Local Bases.","venue":"CoRR","volume":"abs/1310.6011","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DragottiL13","ee":"http://arxiv.org/abs/1310.6011","url":"https://dblp.org/rec/journals/corr/DragottiL13"}, "url":"URL#4253298" }, { "@score":"1", "@id":"4253308", "info":{"authors":{"author":[{"@pid":"136/5867","text":"Yuxian Du"},{"@pid":"129/3294","text":"Shiyu Chen"},{"@pid":"49/2905-2","text":"Yong Hu 0002"},{"@pid":"95/3361","text":"Felix T. S. Chan"},{"@pid":"51/8051","text":"Sankaran Mahadevan"},{"@pid":"66/3604-1","text":"Yong Deng 0001"}]},"title":"Ranking basic belief assignments in decision making under uncertain environment.","venue":"CoRR","volume":"abs/1310.7442","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuCHCMD13","ee":"http://arxiv.org/abs/1310.7442","url":"https://dblp.org/rec/journals/corr/DuCHCMD13"}, "url":"URL#4253308" }, { "@score":"1", "@id":"4253309", "info":{"authors":{"author":[{"@pid":"71/5278","text":"Jia Du"},{"@pid":"97/5934","text":"Alvina Goh"},{"@pid":"23/2647","text":"Anqi Qiu"}]},"title":"Bayesian Estimation of White Matter Atlas from High Angular Resolution Diffusion Imaging.","venue":"CoRR","volume":"abs/1310.3233","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuGQ13","ee":"http://arxiv.org/abs/1310.3233","url":"https://dblp.org/rec/journals/corr/DuGQ13"}, "url":"URL#4253309" }, { "@score":"1", "@id":"4253322", "info":{"authors":{"author":[{"@pid":"d/GerardDuchamp","text":"Gérard Henry Edmond Duchamp"},{"@pid":"126/4882","text":"Nguyen Hoang Nghia"},{"@pid":"172/8378","text":"Thomas Krajewski"},{"@pid":"133/2566","text":"Adrian Tanasa"}]},"title":"Renormalization group-like proof of the universality of the Tutte polynomial for matroids.","venue":"CoRR","volume":"abs/1310.5516","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuchampNKT13","ee":"http://arxiv.org/abs/1310.5516","url":"https://dblp.org/rec/journals/corr/DuchampNKT13"}, "url":"URL#4253322" }, { "@score":"1", "@id":"4253323", "info":{"authors":{"author":[{"@pid":"d/GerardDuchamp","text":"Gérard Henry Edmond Duchamp"},{"@pid":"126/4882","text":"Nguyen Hoang Nghia"},{"@pid":"133/2566","text":"Adrian Tanasa"}]},"title":"A selection-quotient process for packed word Hopf algebra.","venue":"CoRR","volume":"abs/1310.4418","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuchampNT13","ee":"http://arxiv.org/abs/1310.4418","url":"https://dblp.org/rec/journals/corr/DuchampNT13"}, "url":"URL#4253323" }, { "@score":"1", "@id":"4253329", "info":{"authors":{"author":[{"@pid":"70/7588","text":"Paul Duetting"},{"@pid":"h/MonikaRauchHenzinger","text":"Monika Henzinger"},{"@pid":"71/10669","text":"Martin Starnberger"}]},"title":"Valuation Compressions in VCG-Based Combinatorial Auctions.","venue":"CoRR","volume":"abs/1310.3153","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuettingHS13","ee":"http://arxiv.org/abs/1310.3153","url":"https://dblp.org/rec/journals/corr/DuettingHS13"}, "url":"URL#4253329" }, { "@score":"1", "@id":"4253332", "info":{"authors":{"author":[{"@pid":"28/8296","text":"Valmi Dufour-Lussier"},{"@pid":"88/1945","text":"Florence Le Ber"},{"@pid":"20/3650","text":"Jean Lieber"},{"@pid":"78/11395-2","text":"Laura Martin 0002"}]},"title":"Case Adaptation with Qualitative Algebras.","venue":"CoRR","volume":"abs/1310.2743","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dufour-LussierBLM13","ee":"http://arxiv.org/abs/1310.2743","url":"https://dblp.org/rec/journals/corr/Dufour-LussierBLM13"}, "url":"URL#4253332" }, { "@score":"1", "@id":"4253340", "info":{"authors":{"author":[{"@pid":"78/264","text":"Jean-Guillaume Dumas"},{"@pid":"d/DominiqueDuval","text":"Dominique Duval"},{"@pid":"136/5796","text":"Burak Ekici"},{"@pid":"47/1298","text":"Damien Pous"}]},"title":"Formal verification in Coq of program properties involving the global state effect.","venue":"CoRR","volume":"abs/1310.0794","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DumasDEP13","ee":"http://arxiv.org/abs/1310.0794","url":"https://dblp.org/rec/journals/corr/DumasDEP13"}, "url":"URL#4253340" }, { "@score":"1", "@id":"4253341", "info":{"authors":{"author":[{"@pid":"78/264","text":"Jean-Guillaume Dumas"},{"@pid":"d/DominiqueDuval","text":"Dominique Duval"},{"@pid":"30/2140","text":"Jean-Claude Reynaud"}]},"title":"Patterns for computational effects arising from a monad or a comonad.","venue":"CoRR","volume":"abs/1310.0605","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DumasDR13","ee":"http://arxiv.org/abs/1310.0605","url":"https://dblp.org/rec/journals/corr/DumasDR13"}, "url":"URL#4253341" }, { "@score":"1", "@id":"4253342", "info":{"authors":{"author":[{"@pid":"78/264","text":"Jean-Guillaume Dumas"},{"@pid":"d/DominiqueDuval","text":"Dominique Duval"},{"@pid":"30/2140","text":"Jean-Claude Reynaud"}]},"title":"A decorated proof system for exceptions.","venue":"CoRR","volume":"abs/1310.2338","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DumasDR13a","ee":"http://arxiv.org/abs/1310.2338","url":"https://dblp.org/rec/journals/corr/DumasDR13a"}, "url":"URL#4253342" }, { "@score":"1", "@id":"4253355", "info":{"authors":{"author":[{"@pid":"136/5749","text":"Ritabrata Dutta"},{"@pid":"47/7824","text":"Sohan Seth"},{"@pid":"64/5826","text":"Samuel Kaski"}]},"title":"Retrieval of Experiments with Sequential Dirichlet Process Mixtures in Model Space.","venue":"CoRR","volume":"abs/1310.2125","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuttaSK13","ee":"http://arxiv.org/abs/1310.2125","url":"https://dblp.org/rec/journals/corr/DuttaSK13"}, "url":"URL#4253355" }, { "@score":"1", "@id":"4253356", "info":{"authors":{"author":[{"@pid":"96/9669-3","text":"Abhishek Dutta 0003"},{"@pid":"98/5726","text":"Raymond N. J. Veldhuis"},{"@pid":"91/3259","text":"Luuk J. Spreeuwers"}]},"title":"Can Facial Uniqueness be Inferred from Impostor Scores?","venue":"CoRR","volume":"abs/1310.6376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuttaVS13","ee":"http://arxiv.org/abs/1310.6376","url":"https://dblp.org/rec/journals/corr/DuttaVS13"}, "url":"URL#4253356" }, { "@score":"1", "@id":"4253373", "info":{"authors":{"author":[{"@pid":"136/6064","text":"Clovis Eberhart"},{"@pid":"36/5639","text":"Tom Hirschowitz"},{"@pid":"73/11470","text":"Thomas Seiller"}]},"title":"Fully-abstract concurrent games for pi.","venue":"CoRR","volume":"abs/1310.4306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EberhartHS13","ee":"http://arxiv.org/abs/1310.4306","url":"https://dblp.org/rec/journals/corr/EberhartHS13"}, "url":"URL#4253373" }, { "@score":"1", "@id":"4253380", "info":{"authors":{"author":[{"@pid":"62/5243","text":"Bruce Edmonds"},{"@pid":"g/CarlosGershenson","text":"Carlos Gershenson"}]},"title":"Modelling Complexity for Policy: Opportunities and Challenges.","venue":"CoRR","volume":"abs/1310.2290","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EdmondsG13","ee":"http://arxiv.org/abs/1310.2290","url":"https://dblp.org/rec/journals/corr/EdmondsG13"}, "url":"URL#4253380" }, { "@score":"1", "@id":"4253387", "info":{"authors":{"author":{"@pid":"31/3828","text":"Jan Egger"}},"title":"PCG-Cut: Graph Driven Segmentation of the Prostate Central Gland.","venue":"CoRR","volume":"abs/1310.3366","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Egger13a","ee":"http://arxiv.org/abs/1310.3366","url":"https://dblp.org/rec/journals/corr/Egger13a"}, "url":"URL#4253387" }, { "@score":"1", "@id":"4253388", "info":{"authors":{"author":[{"@pid":"31/3828","text":"Jan Egger"},{"@pid":"04/9366","text":"Miriam H. A. Bauer"},{"@pid":"24/1536","text":"Stefan Großkopf"},{"@pid":"62/3028","text":"Christina Biermann"},{"@pid":"f/BerndFreisleben","text":"Bernd Freisleben"},{"@pid":"89/4664","text":"Christopher Nimsky"}]},"title":"Determination, Calculation and Representation of the Upper and Lower Sealing Zones During Virtual Stenting of Aneurysms.","venue":"CoRR","volume":"abs/1310.5755","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EggerBGBFN13","ee":"http://arxiv.org/abs/1310.5755","url":"https://dblp.org/rec/journals/corr/EggerBGBFN13"}, "url":"URL#4253388" }, { "@score":"1", "@id":"4253390", "info":{"authors":{"author":[{"@pid":"136/5804","text":"Michael Eggert"},{"@pid":"136/6153","text":"Roger Häußling"},{"@pid":"126/0576","text":"Martin Henze"},{"@pid":"136/5929","text":"Lars Hermerschmidt"},{"@pid":"98/7880","text":"René Hummen"},{"@pid":"136/5682","text":"Daniel Kerpen"},{"@pid":"136/5839","text":"Antonio Navarro Pérez"},{"@pid":"r/BernhardRumpe","text":"Bernhard Rumpe"},{"@pid":"74/4552-1","text":"Dirk Thißen 0001"},{"@pid":"w/KlausWehrle","text":"Klaus Wehrle"}]},"title":"SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators.","venue":"CoRR","volume":"abs/1310.6542","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EggertHHHHKPRTW13","ee":"http://arxiv.org/abs/1310.6542","url":"https://dblp.org/rec/journals/corr/EggertHHHHKPRTW13"}, "url":"URL#4253390" }, { "@score":"1", "@id":"4253399", "info":{"authors":{"author":[{"@pid":"117/7268","text":"Michael Eickenberg"},{"@pid":"11/9764","text":"Fabian Pedregosa"},{"@pid":"136/5891","text":"Senoussi Mehdi"},{"@pid":"15/7980","text":"Alexandre Gramfort"},{"@pid":"62/2019","text":"Bertrand Thirion"}]},"title":"Second order scattering descriptors predict fMRI activity due to visual textures.","venue":"CoRR","volume":"abs/1310.1257","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EickenbergPMGT13","ee":"http://arxiv.org/abs/1310.1257","url":"https://dblp.org/rec/journals/corr/EickenbergPMGT13"}, "url":"URL#4253399" }, { "@score":"1", "@id":"4253400", "info":{"authors":{"author":[{"@pid":"132/6673","text":"Abdulla Eid"},{"@pid":"67/5690","text":"Iwan M. Duursma"}]},"title":"Using concatenated algebraic geometry codes in channel polarization.","venue":"CoRR","volume":"abs/1310.7159","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EidD13","ee":"http://arxiv.org/abs/1310.7159","url":"https://dblp.org/rec/journals/corr/EidD13"}, "url":"URL#4253400" }, { "@score":"1", "@id":"4253401", "info":{"authors":{"author":{"@pid":"89/2195","text":"Jan van Eijck"}},"title":"PDL as a Multi-Agent Strategy Logic.","venue":"CoRR","volume":"abs/1310.6437","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Eijck13","ee":"http://arxiv.org/abs/1310.6437","url":"https://dblp.org/rec/journals/corr/Eijck13"}, "url":"URL#4253401" }, { "@score":"1", "@id":"4253414", "info":{"authors":{"author":[{"@pid":"136/5967","text":"M. Sudheep Elayidom"},{"@pid":"136/6129","text":"Chinchu Jose"},{"@pid":"136/5676","text":"Anitta Puthussery"},{"@pid":"136/5829","text":"Neenu K. Sasi"}]},"title":"Text Classification For Authorship Attribution Analysis.","venue":"CoRR","volume":"abs/1310.4909","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElayidomJPS13","ee":"http://arxiv.org/abs/1310.4909","url":"https://dblp.org/rec/journals/corr/ElayidomJPS13"}, "url":"URL#4253414" }, { "@score":"1", "@id":"4253421", "info":{"authors":{"author":[{"@pid":"66/4371","text":"Murray Elder"},{"@pid":"78/814","text":"Arkadius G. Kalka"}]},"title":"Logspace computations for Garside groups of spindle type.","venue":"CoRR","volume":"abs/1310.0933","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElderK13","ee":"http://arxiv.org/abs/1310.0933","url":"https://dblp.org/rec/journals/corr/ElderK13"}, "url":"URL#4253421" }, { "@score":"1", "@id":"4253426", "info":{"authors":{"author":[{"@pid":"125/2894","text":"Mohamed Elhoseiny"},{"@pid":"59/8281","text":"Hossam El Deen Mostafa Faheem"},{"@pid":"136/6110","text":"Taymour Nazmy"},{"@pid":"07/8036","text":"Eman Shaaban"}]},"title":"GPU-Framework for Teamwork Action Recognition.","venue":"CoRR","volume":"abs/1310.3322","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElhoseinyFNS13","ee":"http://arxiv.org/abs/1310.3322","url":"https://dblp.org/rec/journals/corr/ElhoseinyFNS13"}, "url":"URL#4253426" }, { "@score":"1", "@id":"4253429", "info":{"authors":{"author":[{"@pid":"124/8350","text":"Juan A. Elices"},{"@pid":"91/3114","text":"Fernando Pérez-González"}]},"title":"A highly optimized flow-correlation attack.","venue":"CoRR","volume":"abs/1310.4577","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElicesP13b","ee":"http://arxiv.org/abs/1310.4577","url":"https://dblp.org/rec/journals/corr/ElicesP13b"}, "url":"URL#4253429" }, { "@score":"1", "@id":"4253441", "info":{"authors":{"author":[{"@pid":"136/6046","text":"Abir Elmir"},{"@pid":"41/10543","text":"Badr Elmir"},{"@pid":"00/3604","text":"Bouchaib Bounabat"}]},"title":"Towards an Assessment-oriented Model for External Information System Quality Characterization.","venue":"CoRR","volume":"abs/1310.8111","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ElmirEB13","ee":"http://arxiv.org/abs/1310.8111","url":"https://dblp.org/rec/journals/corr/ElmirEB13"}, "url":"URL#4253441" }, { "@score":"1", "@id":"4253444", "info":{"authors":{"author":[{"@pid":"38/4086","text":"Yuval Elovici"},{"@pid":"55/10544","text":"Michael Fire"},{"@pid":"62/3150","text":"Amir Herzberg"},{"@pid":"94/7397","text":"Haya Schulmann"}]},"title":"Ethical Considerations when Employing Fake Identities in OSN for Research.","venue":"CoRR","volume":"abs/1310.1651","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EloviciFHS13","ee":"http://arxiv.org/abs/1310.1651","url":"https://dblp.org/rec/journals/corr/EloviciFHS13"}, "url":"URL#4253444" }, { "@score":"1", "@id":"4253451", "info":{"authors":{"author":[{"@pid":"136/5727","text":"Habib Emdadi"},{"@pid":"136/5890","text":"Mahsa Yazdanian"},{"@pid":"74/4671","text":"Mir Mohammad Ettefagh"},{"@pid":"97/7800","text":"Mohammad-Reza Feizi-Derakhshi"}]},"title":"Double four-bar crank-slider mechanism dynamic balancing by meta-heuristic algorithms.","venue":"CoRR","volume":"abs/1310.2089","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EmdadiYEF13","ee":"http://arxiv.org/abs/1310.2089","url":"https://dblp.org/rec/journals/corr/EmdadiYEF13"}, "url":"URL#4253451" }, { "@score":"1", "@id":"4253473", "info":{"authors":{"author":[{"@pid":"25/9526","text":"Dóra Erdös"},{"@pid":"05/1558","text":"Pauli Miettinen"}]},"title":"Scalable Boolean Tensor Factorizations using Random Walks.","venue":"CoRR","volume":"abs/1310.4843","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErdosM13","ee":"http://arxiv.org/abs/1310.4843","url":"https://dblp.org/rec/journals/corr/ErdosM13"}, "url":"URL#4253473" }, { "@score":"1", "@id":"4253477", "info":{"authors":{"author":{"@pid":"136/6009","text":"Azadeh Erfan"}},"title":"Determinants of a Successful Migration to Cloud Computing in Iranian Telecommunication Industry.","venue":"CoRR","volume":"abs/1310.7353","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Erfan13","ee":"http://arxiv.org/abs/1310.7353","url":"https://dblp.org/rec/journals/corr/Erfan13"}, "url":"URL#4253477" }, { "@score":"1", "@id":"4253479", "info":{"authors":{"author":[{"@pid":"54/8860","text":"Yaniv Erlich"},{"@pid":"08/3080","text":"Arvind Narayanan"}]},"title":"Routes for breaching and protecting genetic privacy.","venue":"CoRR","volume":"abs/1310.3197","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErlichN13","ee":"http://arxiv.org/abs/1310.3197","url":"https://dblp.org/rec/journals/corr/ErlichN13"}, "url":"URL#4253479" }, { "@score":"1", "@id":"4253485", "info":{"authors":{"author":[{"@pid":"46/4136","text":"Erwan Le Merrer"},{"@pid":"133/1931","text":"Yizhong Liang"},{"@pid":"01/3361","text":"Gilles Trédan"}]},"title":"(Re)partitioning for stream-enabled computation.","venue":"CoRR","volume":"abs/1310.8211","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErwanLG13","ee":"http://arxiv.org/abs/1310.8211","url":"https://dblp.org/rec/journals/corr/ErwanLG13"}, "url":"URL#4253485" }, { "@score":"1", "@id":"4253486", "info":{"authors":{"author":[{"@pid":"86/2693","text":"Hugo Jair Escalante"},{"@pid":"31/6176","text":"Isabelle Guyon"},{"@pid":"10/212","text":"Vassilis Athitsos"},{"@pid":"41/11294","text":"Pat Jangyodsuk"},{"@pid":"69/6563-1","text":"Jun Wan 0001"}]},"title":"Principal motion components for gesture recognition using a single-example.","venue":"CoRR","volume":"abs/1310.4822","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EscalanteGAJW13","ee":"http://arxiv.org/abs/1310.4822","url":"https://dblp.org/rec/journals/corr/EscalanteGAJW13"}, "url":"URL#4253486" }, { "@score":"1", "@id":"4253494", "info":{"authors":{"author":[{"@pid":"e/JEsparza","text":"Javier Esparza"},{"@pid":"21/8131","text":"Loïg Jezequel"},{"@pid":"39/5299","text":"Stefan Schwoon"}]},"title":"Computation of Summaries Using Net Unfoldings.","venue":"CoRR","volume":"abs/1310.2143","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EsparzaJS13","ee":"http://arxiv.org/abs/1310.2143","url":"https://dblp.org/rec/journals/corr/EsparzaJS13"}, "url":"URL#4253494" }, { "@score":"1", "@id":"4253496", "info":{"authors":{"author":[{"@pid":"136/6108","text":"Jérémy Espinas"},{"@pid":"24/493","text":"Raphaëlle Chaine"},{"@pid":"63/6969","text":"Pierre-Marie Gandoin"}]},"title":"Practical Reduction of Edge Flip Sequences in Two-Dimensional Triangulations.","venue":"CoRR","volume":"abs/1310.2586","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/EspinasCG13","ee":"http://arxiv.org/abs/1310.2586","url":"https://dblp.org/rec/journals/corr/EspinasCG13"}, "url":"URL#4253496" }, { "@score":"1", "@id":"4253497", "info":{"authors":{"author":[{"@pid":"136/5827","text":"Eduardo Espinosa-Avila"},{"@pid":"28/5330","text":"Francisco Hernández Quiroz"}]},"title":"Bounded rationality in a dynamic alternate game.","venue":"CoRR","volume":"abs/1310.6411","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Espinosa-AvilaQ13","ee":"http://arxiv.org/abs/1310.6411","url":"https://dblp.org/rec/journals/corr/Espinosa-AvilaQ13"}, "url":"URL#4253497" }, { "@score":"1", "@id":"4253515", "info":{"authors":{"author":[{"@pid":"92/10263","text":"Renato Fabbri"},{"@pid":"48/10262","text":"Vilson Vieira da Silva Junior"},{"@pid":"74/6892","text":"Ricardo Fabbri"},{"@pid":"136/5981","text":"Deborah Christina Antunes"},{"@pid":"136/5726","text":"Marilia Mello Pisani"},{"@pid":"76/1098","text":"Luciano da Fontoura Costa"},{"@pid":"85/811","text":"Osvaldo N. Oliveira Jr."}]},"title":"On the evolution of interaction networks: primitive typology of vertex and prominence of measures.","venue":"CoRR","volume":"abs/1310.7769","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FabbriJFAPCO13","ee":"http://arxiv.org/abs/1310.7769","url":"https://dblp.org/rec/journals/corr/FabbriJFAPCO13"}, "url":"URL#4253515" }, { "@score":"1", "@id":"4253519", "info":{"authors":{"author":[{"@pid":"123/5457","text":"Claude Fachkha"},{"@pid":"122/5447","text":"Elias Bou-Harb"},{"@pid":"d/MDebbabi","text":"Mourad Debbabi"}]},"title":"Fingerprinting Internet DNS Amplification DDoS Activities.","venue":"CoRR","volume":"abs/1310.4216","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FachkhaBD13","ee":"http://arxiv.org/abs/1310.4216","url":"https://dblp.org/rec/journals/corr/FachkhaBD13"}, "url":"URL#4253519" }, { "@score":"1", "@id":"4253540", "info":{"authors":{"author":[{"@pid":"117/4874","text":"Xuhui Fan 0001"},{"@pid":"38/3064","text":"Richard Yi Da Xu"},{"@pid":"14/2589","text":"Longbing Cao"},{"@pid":"117/4296","text":"Yin Song"}]},"title":"Learning Hidden Structures with Relational Models by Adequately Involving Rich Information in A Network.","venue":"CoRR","volume":"abs/1310.1545","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanXCS13","ee":"http://arxiv.org/abs/1310.1545","url":"https://dblp.org/rec/journals/corr/FanXCS13"}, "url":"URL#4253540" }, { "@score":"1", "@id":"4253546", "info":{"authors":{"author":{"@pid":"47/4734","text":"Chung-Chieh Fang"}},"title":"Unified Subharmonic Oscillation Conditions for Peak or Average Current Mode Control.","venue":"CoRR","volume":"abs/1310.7433","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fang13","ee":"http://arxiv.org/abs/1310.7433","url":"https://dblp.org/rec/journals/corr/Fang13"}, "url":"URL#4253546" }, { "@score":"1", "@id":"4253550", "info":{"authors":{"author":[{"@pid":"49/8377","text":"Jianbin Fang"},{"@pid":"62/3310","text":"Ana Lucia Varbanescu"},{"@pid":"s/HJSips","text":"Henk J. Sips"},{"@pid":"11/5010","text":"Lilun Zhang"},{"@pid":"99/4718","text":"Yonggang Che"},{"@pid":"43/826","text":"Chuanfu Xu"}]},"title":"An Empirical Study of Intel Xeon Phi.","venue":"CoRR","volume":"abs/1310.5842","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FangVSZCX13","ee":"http://arxiv.org/abs/1310.5842","url":"https://dblp.org/rec/journals/corr/FangVSZCX13"}, "url":"URL#4253550" }, { "@score":"1", "@id":"4253552", "info":{"authors":{"author":[{"@pid":"29/3425-1","text":"Jian Fang 0001"},{"@pid":"25/3264","text":"Zongben Xu"},{"@pid":"08/7766","text":"Bingchen Zhang"},{"@pid":"34/209","text":"Wen Hong"},{"@pid":"24/8956","text":"Yirong Wu"}]},"title":"Compressed Sensing SAR Imaging with Multilook Processing.","venue":"CoRR","volume":"abs/1310.7217","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FangXZHW13","ee":"http://arxiv.org/abs/1310.7217","url":"https://dblp.org/rec/journals/corr/FangXZHW13"}, "url":"URL#4253552" }, { "@score":"1", "@id":"4253559", "info":{"authors":{"author":[{"@pid":"120/7487","text":"Rodrigo Cabral Farias"},{"@pid":"92/3006","text":"Jean-Marc Brossier"}]},"title":"Optimal Scalar Quantization for Parameter Estimation.","venue":"CoRR","volume":"abs/1310.6945","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FariasB13","ee":"http://arxiv.org/abs/1310.6945","url":"https://dblp.org/rec/journals/corr/FariasB13"}, "url":"URL#4253559" }, { "@score":"1", "@id":"4253561", "info":{"authors":{"author":[{"@pid":"120/7487","text":"Rodrigo Cabral Farias"},{"@pid":"29/3272","text":"Eric Moisan"},{"@pid":"92/3006","text":"Jean-Marc Brossier"}]},"title":"Optimal Asymmetric Binary Quantization for Estimation Under Symmetrically Distributed Noise.","venue":"CoRR","volume":"abs/1310.6938","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FariasMB13","ee":"http://arxiv.org/abs/1310.6938","url":"https://dblp.org/rec/journals/corr/FariasMB13"}, "url":"URL#4253561" }, { "@score":"1", "@id":"4253567", "info":{"authors":{"author":[{"@pid":"60/11141","text":"Farhad Farokhi"},{"@pid":"81/3323","text":"Karl Henrik Johansson"}]},"title":"A Study of Truck Platooning Incentives Using a Congestion Game.","venue":"CoRR","volume":"abs/1310.5534","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarokhiJ13","ee":"http://arxiv.org/abs/1310.5534","url":"https://dblp.org/rec/journals/corr/FarokhiJ13"}, "url":"URL#4253567" }, { "@score":"1", "@id":"4253573", "info":{"authors":{"author":[{"@pid":"96/10060","text":"Nariman Farsad"},{"@pid":"72/8514","text":"Weisi Guo"},{"@pid":"71/6889","text":"Andrew W. Eckford"}]},"title":"Table-Top Molecular Communication: Text Messages Through Chemical Signals.","venue":"CoRR","volume":"abs/1310.0070","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarsadGE13","ee":"http://arxiv.org/abs/1310.0070","url":"https://dblp.org/rec/journals/corr/FarsadGE13"}, "url":"URL#4253573" }, { "@score":"1", "@id":"4253575", "info":{"authors":{"author":[{"@pid":"89/148","text":"Azadeh Farzan"},{"@pid":"61/6578","text":"Zachary Kincaid"}]},"title":"An Algebraic Framework for Compositional Program Analysis.","venue":"CoRR","volume":"abs/1310.3481","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarzanK13","ee":"http://arxiv.org/abs/1310.3481","url":"https://dblp.org/rec/journals/corr/FarzanK13"}, "url":"URL#4253575" }, { "@score":"1", "@id":"4253576", "info":{"authors":{"author":[{"@pid":"50/4042","text":"Dario Fasino"},{"@pid":"136/5777","text":"Francesco Tudisco"}]},"title":"An algebraic analysis of the graph modularity.","venue":"CoRR","volume":"abs/1310.3031","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FasinoT13","ee":"http://arxiv.org/abs/1310.3031","url":"https://dblp.org/rec/journals/corr/FasinoT13"}, "url":"URL#4253576" }, { "@score":"1", "@id":"4253579", "info":{"authors":{"author":[{"@pid":"08/2528-1","text":"Alvaro Luiz Fazenda 0001"},{"@pid":"36/4941","text":"Celso L. Mendes"},{"@pid":"k/LaxmikantVKale","text":"Laxmikant V. Kalé"},{"@pid":"39/5694","text":"Jairo Panetta"},{"@pid":"29/1398","text":"Eduardo Rocha Rodrigues"}]},"title":"Dynamic Load Balancing in GPU-Based Systems - Early Experiments.","venue":"CoRR","volume":"abs/1310.4218","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FazendaMKPR13","ee":"http://arxiv.org/abs/1310.4218","url":"https://dblp.org/rec/journals/corr/FazendaMKPR13"}, "url":"URL#4253579" }, { "@score":"1", "@id":"4253582", "info":{"authors":{"author":[{"@pid":"18/7412","text":"John Fearnley"},{"@pid":"57/4020","text":"Rahul Savani"}]},"title":"Finding Approximate Nash Equilibria of Bimatrix Games via Payoff Queries.","venue":"CoRR","volume":"abs/1310.7419","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FearnleyS13","ee":"http://arxiv.org/abs/1310.7419","url":"https://dblp.org/rec/journals/corr/FearnleyS13"}, "url":"URL#4253582" }, { "@score":"1", "@id":"4253602", "info":{"authors":{"author":{"@pid":"97/831","text":"Robert Feldt"}},"title":"Do System Test Cases Grow Old?","venue":"CoRR","volume":"abs/1310.4989","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Feldt13","ee":"http://arxiv.org/abs/1310.4989","url":"https://dblp.org/rec/journals/corr/Feldt13"}, "url":"URL#4253602" }, { "@score":"1", "@id":"4253615", "info":{"authors":{"author":{"@pid":"48/8772","text":"Olivier Fercoq"}},"title":"Parallel coordinate descent for the Adaboost problem.","venue":"CoRR","volume":"abs/1310.1840","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fercoq13","ee":"http://arxiv.org/abs/1310.1840","url":"https://dblp.org/rec/journals/corr/Fercoq13"}, "url":"URL#4253615" }, { "@score":"1", "@id":"4253621", "info":{"authors":{"author":[{"@pid":"58/4840","text":"Cristina G. Fernandes"},{"@pid":"46/263","text":"Carlos Eduardo Ferreira"},{"@pid":"75/11269","text":"Álvaro Junio Pereira Franco"},{"@pid":"196/0126","text":"Rafael Crivellari Saliba Schouery"}]},"title":"The Unit-Demand Envy-Free Pricing Problem.","venue":"CoRR","volume":"abs/1310.0038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FernandesFFS13","ee":"http://arxiv.org/abs/1310.0038","url":"https://dblp.org/rec/journals/corr/FernandesFFS13"}, "url":"URL#4253621" }, { "@score":"1", "@id":"4253630", "info":{"authors":{"author":[{"@pid":"38/8773","text":"Emilio Ferrara"},{"@pid":"136/5667","text":"Mohsen JafariAsbagh"},{"@pid":"135/8835","text":"Onur Varol"},{"@pid":"38/5620","text":"Vahed Qazvinian"},{"@pid":"79/3056","text":"Filippo Menczer"},{"@pid":"78/5715","text":"Alessandro Flammini"}]},"title":"Clustering Memes in Social Media.","venue":"CoRR","volume":"abs/1310.2665","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerraraJVQMF13","ee":"http://arxiv.org/abs/1310.2665","url":"https://dblp.org/rec/journals/corr/FerraraJVQMF13"}, "url":"URL#4253630" }, { "@score":"1", "@id":"4253631", "info":{"authors":{"author":[{"@pid":"38/8773","text":"Emilio Ferrara"},{"@pid":"135/8835","text":"Onur Varol"},{"@pid":"79/3056","text":"Filippo Menczer"},{"@pid":"78/5715","text":"Alessandro Flammini"}]},"title":"Traveling Trends: Social Butterflies or Frequent Fliers?","venue":"CoRR","volume":"abs/1310.2671","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerraraVMF13","ee":"http://arxiv.org/abs/1310.2671","url":"https://dblp.org/rec/journals/corr/FerraraVMF13"}, "url":"URL#4253631" }, { "@score":"1", "@id":"4253639", "info":{"authors":{"author":{"@pid":"39/4271","text":"Ramon Ferrer-i-Cancho"}},"title":"The optimality of attaching unlinked labels to unlinked objects.","venue":"CoRR","volume":"abs/1310.5884","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ferrer-i-Cancho13b","ee":"http://arxiv.org/abs/1310.5884","url":"https://dblp.org/rec/journals/corr/Ferrer-i-Cancho13b"}, "url":"URL#4253639" }, { "@score":"1", "@id":"4253653", "info":{"authors":{"author":[{"@pid":"136/6002","text":"Isik Baris Fidaner"},{"@pid":"41/6613","text":"Ali Taylan Cemgil"}]},"title":"Summary Statistics for Partitionings and Feature Allocations.","venue":"CoRR","volume":"abs/1310.0509","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FidanerC13","ee":"http://arxiv.org/abs/1310.0509","url":"https://dblp.org/rec/journals/corr/FidanerC13"}, "url":"URL#4253653" }, { "@score":"1", "@id":"4253654", "info":{"authors":{"author":{"@pid":"136/5797","text":"Pawel Fiedor"}},"title":"Frequency Effects on Predictability of Stock Returns.","venue":"CoRR","volume":"abs/1310.5540","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fiedor13","ee":"http://arxiv.org/abs/1310.5540","url":"https://dblp.org/rec/journals/corr/Fiedor13"}, "url":"URL#4253654" }, { "@score":"1", "@id":"4253664", "info":{"authors":{"author":[{"@pid":"35/5597","text":"Maurizio Filippone"},{"@pid":"g/MarkAGirolami","text":"Mark A. Girolami"}]},"title":"Exact-Approximate Bayesian Inference for Gaussian Processes.","venue":"CoRR","volume":"abs/1310.0740","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FilipponeG13","ee":"http://arxiv.org/abs/1310.0740","url":"https://dblp.org/rec/journals/corr/FilipponeG13"}, "url":"URL#4253664" }, { "@score":"1", "@id":"4253674", "info":{"authors":{"author":[{"@pid":"49/381","text":"Samuel Fiorini"},{"@pid":"11/8034","text":"Serge Massar"},{"@pid":"00/7023","text":"Manas K. Patra"},{"@pid":"99/4758","text":"Hans Raj Tiwary"}]},"title":"Generalised probabilistic theories and conic extensions of polytopes.","venue":"CoRR","volume":"abs/1310.4125","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FioriniMPT13","ee":"http://arxiv.org/abs/1310.4125","url":"https://dblp.org/rec/journals/corr/FioriniMPT13"}, "url":"URL#4253674" }, { "@score":"1", "@id":"4253680", "info":{"authors":{"author":[{"@pid":"15/9578","text":"Koorosh Firouzbakht"},{"@pid":"25/5432","text":"Guevara Noubir"},{"@pid":"41/806","text":"Masoud Salehi"}]},"title":"On the Performance of Adaptive Packetized Wireless Communication Links under Jamming.","venue":"CoRR","volume":"abs/1310.5420","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FirouzbakhtNS13","ee":"http://arxiv.org/abs/1310.5420","url":"https://dblp.org/rec/journals/corr/FirouzbakhtNS13"}, "url":"URL#4253680" }, { "@score":"1", "@id":"4253682", "info":{"authors":{"author":[{"@pid":"f/FelixAFischer","text":"Felix A. Fischer"},{"@pid":"56/7413","text":"Max Klimm"}]},"title":"Optimal Impartial Selection.","venue":"CoRR","volume":"abs/1310.8631","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FischerK13","ee":"http://arxiv.org/abs/1310.8631","url":"https://dblp.org/rec/journals/corr/FischerK13"}, "url":"URL#4253682" }, { "@score":"1", "@id":"4253683", "info":{"authors":{"author":{"@pid":"61/6100","text":"Carlo Fischione"}},"title":"Teaching Wireless Sensor Networks: An Holistic Approach Bridging Theory and Practice at the Master Level.","venue":"CoRR","volume":"abs/1310.2488","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fischione13","ee":"http://arxiv.org/abs/1310.2488","url":"https://dblp.org/rec/journals/corr/Fischione13"}, "url":"URL#4253683" }, { "@score":"1", "@id":"4253693", "info":{"authors":{"author":[{"@pid":"136/5956","text":"Madison Flannery"},{"@pid":"122/2717","text":"Shannon Fenn"},{"@pid":"122/2709","text":"David M. Budden"}]},"title":"RANSAC: Identification of Higher-Order Geometric Features and Applications in Humanoid Robot Soccer.","venue":"CoRR","volume":"abs/1310.5781","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlanneryFB13","ee":"http://arxiv.org/abs/1310.5781","url":"https://dblp.org/rec/journals/corr/FlanneryFB13"}, "url":"URL#4253693" }, { "@score":"1", "@id":"4253694", "info":{"authors":{"author":[{"@pid":"136/5816","text":"Tobias Fleck"},{"@pid":"128/4179","text":"Andrea Kappes"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"}]},"title":"Graph Clustering with Surprise: Complexity and Exact Solutions.","venue":"CoRR","volume":"abs/1310.6019","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FleckKW13","ee":"http://arxiv.org/abs/1310.6019","url":"https://dblp.org/rec/journals/corr/FleckKW13"}, "url":"URL#4253694" }, { "@score":"1", "@id":"4253716", "info":{"authors":{"author":[{"@pid":"36/8083","text":"Fulvio Forni"},{"@pid":"44/1631","text":"Sergio Galeani"},{"@pid":"15/5246","text":"Dragan Nesic"},{"@pid":"69/3222","text":"Luca Zaccarian"}]},"title":"Event-triggered transmission for linear control over communication channels.","venue":"CoRR","volume":"abs/1310.0932","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ForniGNZ13","ee":"http://arxiv.org/abs/1310.0932","url":"https://dblp.org/rec/journals/corr/ForniGNZ13"}, "url":"URL#4253716" }, { "@score":"1", "@id":"4253721", "info":{"authors":{"author":[{"@pid":"95/4731","text":"Dimitris Fotakis 0001"},{"@pid":"k/PiotrKrysta","text":"Piotr Krysta"},{"@pid":"30/6089","text":"Carmine Ventre"}]},"title":"Combinatorial Auctions without Money.","venue":"CoRR","volume":"abs/1310.0177","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FotakisKV13","ee":"http://arxiv.org/abs/1310.0177","url":"https://dblp.org/rec/journals/corr/FotakisKV13"}, "url":"URL#4253721" }, { "@score":"1", "@id":"4253728", "info":{"authors":{"author":[{"@pid":"74/5731","text":"Fotis Foukalas"},{"@pid":"33/717","text":"Tamer Khattab"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Adaptive Modulation in Multi-user Cognitive Radio Networks over Fading Channels.","venue":"CoRR","volume":"abs/1310.1766","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FoukalasKP13","ee":"http://arxiv.org/abs/1310.1766","url":"https://dblp.org/rec/journals/corr/FoukalasKP13"}, "url":"URL#4253728" }, { "@score":"1", "@id":"4253731", "info":{"authors":{"author":{"@pid":"46/4106","text":"Jacob Fox"}},"title":"Stanley-Wilf limits are typically exponential.","venue":"CoRR","volume":"abs/1310.8378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fox13","ee":"http://arxiv.org/abs/1310.8378","url":"https://dblp.org/rec/journals/corr/Fox13"}, "url":"URL#4253731" }, { "@score":"1", "@id":"4253733", "info":{"authors":{"author":[{"@pid":"91/1979","text":"Wojciech Fraczak"},{"@pid":"42/6005","text":"Loukas Georgiadis"},{"@pid":"39/1855","text":"Andrew Miller"},{"@pid":"t/RobertEndreTarjan","text":"Robert Endre Tarjan"}]},"title":"Finding Dominators via Disjoint Set Union.","venue":"CoRR","volume":"abs/1310.2118","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FraczakGMT13","ee":"http://arxiv.org/abs/1310.2118","url":"https://dblp.org/rec/journals/corr/FraczakGMT13"}, "url":"URL#4253733" }, { "@score":"1", "@id":"4253734", "info":{"authors":{"author":[{"@pid":"26/9670","text":"Klaus M. Frahm"},{"@pid":"22/3233","text":"Young-Ho Eom"},{"@pid":"30/3449","text":"Dima Shepelyansky"}]},"title":"Google matrix of the citation network of Physical Review.","venue":"CoRR","volume":"abs/1310.5624","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrahmES13","ee":"http://arxiv.org/abs/1310.5624","url":"https://dblp.org/rec/journals/corr/FrahmES13"}, "url":"URL#4253734" }, { "@score":"1", "@id":"4253758", "info":{"authors":{"author":[{"@pid":"136/5646","text":"André Frochaux"},{"@pid":"s/NicoleSchweikardt","text":"Nicole Schweikardt"}]},"title":"A note on monadic datalog on unranked trees.","venue":"CoRR","volume":"abs/1310.1316","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrochauxS13","ee":"http://arxiv.org/abs/1310.1316","url":"https://dblp.org/rec/journals/corr/FrochauxS13"}, "url":"URL#4253758" }, { "@score":"1", "@id":"4253764", "info":{"authors":{"author":{"@pid":"19/7123","text":"Hongfei Fu 0001"}},"title":"Maximal Cost-Bounded Reachability Probability on Continuous-Time Markov Decision Processes.","venue":"CoRR","volume":"abs/1310.2514","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fu13","ee":"http://arxiv.org/abs/1310.2514","url":"https://dblp.org/rec/journals/corr/Fu13"}, "url":"URL#4253764" }, { "@score":"1", "@id":"4253783", "info":{"authors":{"author":{"@pid":"35/6826","text":"Takuro Fukunaga"}},"title":"Spider covers for prize-collecting network activation problem.","venue":"CoRR","volume":"abs/1310.5422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fukunaga13","ee":"http://arxiv.org/abs/1310.5422","url":"https://dblp.org/rec/journals/corr/Fukunaga13"}, "url":"URL#4253783" }, { "@score":"1", "@id":"4253801", "info":{"authors":{"author":{"@pid":"91/419","text":"Liane Gabora"}},"title":"EVOC: A Computer Model of the Evolution of Culture.","venue":"CoRR","volume":"abs/1310.0522","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gabora13b","ee":"http://arxiv.org/abs/1310.0522","url":"https://dblp.org/rec/journals/corr/Gabora13b"}, "url":"URL#4253801" }, { "@score":"1", "@id":"4253802", "info":{"authors":{"author":{"@pid":"91/419","text":"Liane Gabora"}},"title":"Cultural Evolution as Distributed Computation.","venue":"CoRR","volume":"abs/1310.6342","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gabora13c","ee":"http://arxiv.org/abs/1310.6342","url":"https://dblp.org/rec/journals/corr/Gabora13c"}, "url":"URL#4253802" }, { "@score":"1", "@id":"4253803", "info":{"authors":{"author":[{"@pid":"91/419","text":"Liane Gabora"},{"@pid":"a/DiederikAerts","text":"Diederik Aerts"}]},"title":"Contextualizing concepts.","venue":"CoRR","volume":"abs/1310.7682","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaboraA13","ee":"http://arxiv.org/abs/1310.7682","url":"https://dblp.org/rec/journals/corr/GaboraA13"}, "url":"URL#4253803" }, { "@score":"1", "@id":"4253805", "info":{"authors":{"author":[{"@pid":"91/419","text":"Liane Gabora"},{"@pid":"136/6051","text":"Wei Wen Chia"},{"@pid":"53/9836","text":"Hadi Firouzi"}]},"title":"A Computational Model of Two Cognitive Transitions Underlying Cultural Evolution.","venue":"CoRR","volume":"abs/1310.4086","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaboraCF13","ee":"http://arxiv.org/abs/1310.4086","url":"https://dblp.org/rec/journals/corr/GaboraCF13"}, "url":"URL#4253805" }, { "@score":"1", "@id":"4253807", "info":{"authors":{"author":[{"@pid":"91/419","text":"Liane Gabora"},{"@pid":"53/9836","text":"Hadi Firouzi"}]},"title":"Society Functions Best with an Intermediate Level of Creativity.","venue":"CoRR","volume":"abs/1310.4753","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaboraF13","ee":"http://arxiv.org/abs/1310.4753","url":"https://dblp.org/rec/journals/corr/GaboraF13"}, "url":"URL#4253807" }, { "@score":"1", "@id":"4253809", "info":{"authors":{"author":[{"@pid":"91/419","text":"Liane Gabora"},{"@pid":"89/10530","text":"Maryam Saberi"}]},"title":"An Agent-based Model of the Cognitive Mechanisms Underlying the Origins of Creative Cultural Evolution.","venue":"CoRR","volume":"abs/1310.3781","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaboraS13","ee":"http://arxiv.org/abs/1310.3781","url":"https://dblp.org/rec/journals/corr/GaboraS13"}, "url":"URL#4253809" }, { "@score":"1", "@id":"4253826", "info":{"authors":{"author":[{"@pid":"10/5740","text":"François Le Gall"},{"@pid":"02/5630","text":"Harumichi Nishimura"}]},"title":"Quantum Algorithms for Matrix Products over Semirings.","venue":"CoRR","volume":"abs/1310.3898","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GallN13","ee":"http://arxiv.org/abs/1310.3898","url":"https://dblp.org/rec/journals/corr/GallN13"}, "url":"URL#4253826" }, { "@score":"1", "@id":"4253827", "info":{"authors":{"author":[{"@pid":"10/5740","text":"François Le Gall"},{"@pid":"02/5630","text":"Harumichi Nishimura"},{"@pid":"42/1198","text":"Seiichiro Tani"}]},"title":"Quantum Algorithms for Finding Constant-sized Sub-hypergraphs over 3-uniform Hypergraphs.","venue":"CoRR","volume":"abs/1310.4127","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GallNT13","ee":"http://arxiv.org/abs/1310.4127","url":"https://dblp.org/rec/journals/corr/GallNT13"}, "url":"URL#4253827" }, { "@score":"1", "@id":"4253850", "info":{"authors":{"author":[{"@pid":"76/2452-15","text":"Yuan Gao 0015"},{"@pid":"30/545","text":"Guanrong Chen"},{"@pid":"86/7576","text":"Rosa H. M. Chan"}]},"title":"Naming Game on Networks: Let Everyone be Both Speaker and Hearer.","venue":"CoRR","volume":"abs/1310.4169","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoCC13","ee":"http://arxiv.org/abs/1310.4169","url":"https://dblp.org/rec/journals/corr/GaoCC13"}, "url":"URL#4253850" }, { "@score":"1", "@id":"4253855", "info":{"authors":{"author":[{"@pid":"22/8296","text":"Sicun Gao"},{"@pid":"43/7541","text":"Soonho Kong"},{"@pid":"c/EdmundMClarke","text":"Edmund M. Clarke"}]},"title":"Satisfiability Modulo ODEs.","venue":"CoRR","volume":"abs/1310.8278","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoKC13","ee":"http://arxiv.org/abs/1310.8278","url":"https://dblp.org/rec/journals/corr/GaoKC13"}, "url":"URL#4253855" }, { "@score":"1", "@id":"4253858", "info":{"authors":{"author":[{"@pid":"64/9850","text":"Zongsheng Gao"},{"@pid":"95/3736","text":"Jun Liu"},{"@pid":"x/KeXu","text":"Ke Xu 0001"}]},"title":"A novel weighting scheme for random $k$-SAT.","venue":"CoRR","volume":"abs/1310.4303","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoLX13","ee":"http://arxiv.org/abs/1310.4303","url":"https://dblp.org/rec/journals/corr/GaoLX13"}, "url":"URL#4253858" }, { "@score":"1", "@id":"4253865", "info":{"authors":{"author":[{"@pid":"87/6732","text":"Juntao Gao"},{"@pid":"74/2768","text":"Yulong Shen"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"},{"@pid":"17/2703","text":"Jie Li"}]},"title":"Source Delay in Mobile Ad Hoc Networks.","venue":"CoRR","volume":"abs/1310.7444","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoSJL13","ee":"http://arxiv.org/abs/1310.7444","url":"https://dblp.org/rec/journals/corr/GaoSJL13"}, "url":"URL#4253865" }, { "@score":"1", "@id":"4253884", "info":{"authors":{"author":[{"@pid":"23/4245","text":"Andrey Garnaev"},{"@pid":"72/5440","text":"Wade Trappe"},{"@pid":"25/9071","text":"Chun-Ta Kung"}]},"title":"Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments.","venue":"CoRR","volume":"abs/1310.7247","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GarnaevTK13","ee":"http://arxiv.org/abs/1310.7247","url":"https://dblp.org/rec/journals/corr/GarnaevTK13"}, "url":"URL#4253884" }, { "@score":"1", "@id":"4253886", "info":{"authors":{"author":[{"@pid":"29/7058","text":"Roman Garnett"},{"@pid":"59/6403","text":"Michael A. Osborne"},{"@pid":"08/9077","text":"Philipp Hennig"}]},"title":"Active Learning of Linear Embeddings for Gaussian Processes.","venue":"CoRR","volume":"abs/1310.6740","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GarnettOH13","ee":"http://arxiv.org/abs/1310.6740","url":"https://dblp.org/rec/journals/corr/GarnettOH13"}, "url":"URL#4253886" }, { "@score":"1", "@id":"4253891", "info":{"authors":{"author":[{"@pid":"36/5673","text":"Wolfgang Gatterbauer"},{"@pid":"s/DanSuciu","text":"Dan Suciu"}]},"title":"Dissociation and Propagation for Efficient Query Evaluation over Probabilistic Databases.","venue":"CoRR","volume":"abs/1310.6257","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GatterbauerS13","ee":"http://arxiv.org/abs/1310.6257","url":"https://dblp.org/rec/journals/corr/GatterbauerS13"}, "url":"URL#4253891" }, { "@score":"1", "@id":"4253892", "info":{"authors":{"author":[{"@pid":"119/5082","text":"Kumar Gaurav"},{"@pid":"88/4182","text":"Bartlomiej Blaszczyszyn"},{"@pid":"84/7997","text":"Holger Paul Keeler"}]},"title":"Pioneers of Influence Propagation in Social Networks.","venue":"CoRR","volume":"abs/1310.2441","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GauravBK13","ee":"http://arxiv.org/abs/1310.2441","url":"https://dblp.org/rec/journals/corr/GauravBK13"}, "url":"URL#4253892" }, { "@score":"1", "@id":"4253901", "info":{"authors":{"author":{"@pid":"22/6481","text":"Martin Josef Geiger"}},"title":"Iterated Variable Neighborhood Search for the resource constrained multi-mode multi-project scheduling problem.","venue":"CoRR","volume":"abs/1310.0602","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Geiger13","ee":"http://arxiv.org/abs/1310.0602","url":"https://dblp.org/rec/journals/corr/Geiger13"}, "url":"URL#4253901" }, { "@score":"1", "@id":"4253902", "info":{"authors":{"author":[{"@pid":"05/9225","text":"Bernhard C. Geiger"},{"@pid":"81/3989","text":"Gernot Kubin"}]},"title":"Information Loss and Anti-Aliasing Filters in Multirate Systems.","venue":"CoRR","volume":"abs/1310.8487","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeigerK13","ee":"http://arxiv.org/abs/1310.8487","url":"https://dblp.org/rec/journals/corr/GeigerK13"}, "url":"URL#4253902" }, { "@score":"1", "@id":"4253917", "info":{"authors":{"author":[{"@pid":"79/7865","text":"Charo I. Del Genio"},{"@pid":"76/8624","text":"Thomas A. House"}]},"title":"Endemic infections are always possible on regular networks.","venue":"CoRR","volume":"abs/1310.3128","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GenioH13","ee":"http://arxiv.org/abs/1310.3128","url":"https://dblp.org/rec/journals/corr/GenioH13"}, "url":"URL#4253917" }, { "@score":"1", "@id":"4253920", "info":{"authors":{"author":[{"@pid":"61/10358","text":"Orestis Georgiou"},{"@pid":"66/10357","text":"Carl P. Dettmann"},{"@pid":"78/2259","text":"Justin P. Coon"}]},"title":"Connectivity of confined 3D Networks with Anisotropically Radiating Nodes.","venue":"CoRR","volume":"abs/1310.7473","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeorgiouDC13","ee":"http://arxiv.org/abs/1310.7473","url":"https://dblp.org/rec/journals/corr/GeorgiouDC13"}, "url":"URL#4253920" }, { "@score":"1", "@id":"4253929", "info":{"authors":{"author":[{"@pid":"136/5902","text":"Fulvio Gesmundo"},{"@pid":"59/8717","text":"Jonathan D. Hauenstein"},{"@pid":"83/8775","text":"Christian Ikenmeyer"},{"@pid":"54/2884","text":"J. M. Landsberg"}]},"title":"Complexity of linear circuits and geometry.","venue":"CoRR","volume":"abs/1310.1362","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GesmundoHIL13","ee":"http://arxiv.org/abs/1310.1362","url":"https://dblp.org/rec/journals/corr/GesmundoHIL13"}, "url":"URL#4253929" }, { "@score":"1", "@id":"4253942", "info":{"authors":{"author":[{"@pid":"23/9671","text":"Wajeb Gharibi"},{"@pid":"136/5704","text":"Marwah Mohammed Bakri"}]},"title":"Protein Threading Based on Nonlinear Integer Programming.","venue":"CoRR","volume":"abs/1310.0395","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GharibiB13","ee":"http://arxiv.org/abs/1310.0395","url":"https://dblp.org/rec/journals/corr/GharibiB13"}, "url":"URL#4253942" }, { "@score":"1", "@id":"4253948", "info":{"authors":{"author":[{"@pid":"129/9773","text":"Saeed Ghazanfari-Rad"},{"@pid":"23/2633","text":"Fabrice Labeau"}]},"title":"Formulation and Steady-state Analysis of LMS Adaptive Networks for Distributed Estimation in the Presence of Transmission Errors.","venue":"CoRR","volume":"abs/1310.7368","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ghazanfari-RadL13","ee":"http://arxiv.org/abs/1310.7368","url":"https://dblp.org/rec/journals/corr/Ghazanfari-RadL13"}, "url":"URL#4253948" }, { "@score":"1", "@id":"4253950", "info":{"authors":{"author":[{"@pid":"18/8831","text":"Soheyl Gherekhloo"},{"@pid":"38/7482","text":"Anas Chaaban"},{"@pid":"12/218","text":"Aydin Sezgin"}]},"title":"The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference.","venue":"CoRR","volume":"abs/1310.1314","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GherekhlooCS13","ee":"http://arxiv.org/abs/1310.1314","url":"https://dblp.org/rec/journals/corr/GherekhlooCS13"}, "url":"URL#4253950" }, { "@score":"1", "@id":"4253951", "info":{"authors":{"author":[{"@pid":"18/8831","text":"Soheyl Gherekhloo"},{"@pid":"38/7482","text":"Anas Chaaban"},{"@pid":"12/218","text":"Aydin Sezgin"}]},"title":"Topological Interference Management with Alternating Connectivity: The Wyner-Type Three User Interference Channel.","venue":"CoRR","volume":"abs/1310.2385","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GherekhlooCS13a","ee":"http://arxiv.org/abs/1310.2385","url":"https://dblp.org/rec/journals/corr/GherekhlooCS13a"}, "url":"URL#4253951" }, { "@score":"1", "@id":"4253965", "info":{"authors":{"author":[{"@pid":"29/1822","text":"Rumi Ghosh"},{"@pid":"89/2878","text":"Bernardo A. Huberman"}]},"title":"Ultrametricity of Information Cascades.","venue":"CoRR","volume":"abs/1310.2619","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhoshH13","ee":"http://arxiv.org/abs/1310.2619","url":"https://dblp.org/rec/journals/corr/GhoshH13"}, "url":"URL#4253965" }, { "@score":"1", "@id":"4253969", "info":{"authors":{"author":[{"@pid":"16/1532","text":"Elena Giachino"},{"@pid":"l/CosimoLaneve","text":"Cosimo Laneve"}]},"title":"Deadlock detection in linear recursive programs.","venue":"CoRR","volume":"abs/1310.7449","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiachinoL13","ee":"http://arxiv.org/abs/1310.7449","url":"https://dblp.org/rec/journals/corr/GiachinoL13"}, "url":"URL#4253969" }, { "@score":"1", "@id":"4253970", "info":{"authors":{"author":{"@pid":"136/5992","text":"Irene Giacomelli"}},"title":"Improved Decoding Algorithms for Reed-Solomon Codes.","venue":"CoRR","volume":"abs/1310.2473","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Giacomelli13","ee":"http://arxiv.org/abs/1310.2473","url":"https://dblp.org/rec/journals/corr/Giacomelli13"}, "url":"URL#4253970" }, { "@score":"1", "@id":"4253979", "info":{"authors":{"author":[{"@pid":"129/8196","text":"Jussi Gillberg"},{"@pid":"32/894","text":"Pekka Marttinen"},{"@pid":"63/2021","text":"Matti Pirinen"},{"@pid":"136/6034","text":"Antti J. Kangas"},{"@pid":"79/7108","text":"Pasi Soininen"},{"@pid":"136/5869","text":"Marjo-Riitta Järvelin"},{"@pid":"99/544","text":"Mika Ala-Korpela"},{"@pid":"64/5826","text":"Samuel Kaski"}]},"title":"Bayesian Information Sharing Between Noise And Regression Models Improves Prediction of Weak Effects.","venue":"CoRR","volume":"abs/1310.4362","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GillbergMPKSJAK13","ee":"http://arxiv.org/abs/1310.4362","url":"https://dblp.org/rec/journals/corr/GillbergMPKSJAK13"}, "url":"URL#4253979" }, { "@score":"1", "@id":"4253980", "info":{"authors":{"author":[{"@pid":"45/6855","text":"Robert P. Gilles"},{"@pid":"51/9715","text":"Dimitrios Diamantaras"}]},"title":"Platform Competition as Network Contestability.","venue":"CoRR","volume":"abs/1310.3521","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GillesD13","ee":"http://arxiv.org/abs/1310.3521","url":"https://dblp.org/rec/journals/corr/GillesD13"}, "url":"URL#4253980" }, { "@score":"1", "@id":"4253981", "info":{"authors":{"author":{"@pid":"65/8017","text":"Nicolas Gillis"}},"title":"Successive Nonnegative Projection Algorithm for Robust Nonnegative Blind Source Separation.","venue":"CoRR","volume":"abs/1310.7529","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gillis13","ee":"http://arxiv.org/abs/1310.7529","url":"https://dblp.org/rec/journals/corr/Gillis13"}, "url":"URL#4253981" }, { "@score":"1", "@id":"4253982", "info":{"authors":{"author":[{"@pid":"65/8017","text":"Nicolas Gillis"},{"@pid":"79/2979","text":"Da Kuang"},{"@pid":"78/5322","text":"Haesun Park"}]},"title":"Hierarchical Clustering of Hyperspectral Images using Rank-Two Nonnegative Matrix Factorization.","venue":"CoRR","volume":"abs/1310.7441","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GillisKP13","ee":"http://arxiv.org/abs/1310.7441","url":"https://dblp.org/rec/journals/corr/GillisKP13"}, "url":"URL#4253982" }, { "@score":"1", "@id":"4253983", "info":{"authors":{"author":[{"@pid":"65/8017","text":"Nicolas Gillis"},{"@pid":"44/4752","text":"Stephen A. Vavasis"}]},"title":"Semidefinite Programming Based Preconditioning for More Robust Near-Separable Nonnegative Matrix Factorization.","venue":"CoRR","volume":"abs/1310.2273","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GillisV13","ee":"http://arxiv.org/abs/1310.2273","url":"https://dblp.org/rec/journals/corr/GillisV13"}, "url":"URL#4253983" }, { "@score":"1", "@id":"4253986", "info":{"authors":{"author":[{"@pid":"05/6398","text":"Yogesh A. Girdhar"},{"@pid":"85/8320","text":"David Whitney"},{"@pid":"d/GregoryDudek","text":"Gregory Dudek"}]},"title":"Curiosity Based Exploration for Learning Terrain Models.","venue":"CoRR","volume":"abs/1310.6767","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GirdharWD13","ee":"http://arxiv.org/abs/1310.6767","url":"https://dblp.org/rec/journals/corr/GirdharWD13"}, "url":"URL#4253986" }, { "@score":"1", "@id":"4253995", "info":{"authors":{"author":[{"@pid":"136/5897","text":"Oleg Gittsovich"},{"@pid":"115/7269","text":"Normand J. Beaudry"},{"@pid":"136/6054","text":"Varun Narasimhachar"},{"@pid":"136/6079","text":"Ruben Romero Alvarez"},{"@pid":"04/8035","text":"Tobias Moroder"},{"@pid":"88/3221","text":"Norbert Lütkenhaus"}]},"title":"Squashing model for detectors and applications to quantum key distribution protocols.","venue":"CoRR","volume":"abs/1310.5059","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GittsovichBNAML13","ee":"http://arxiv.org/abs/1310.5059","url":"https://dblp.org/rec/journals/corr/GittsovichBNAML13"}, "url":"URL#4253995" }, { "@score":"1", "@id":"4253999", "info":{"authors":{"author":[{"@pid":"117/3630","text":"Patrick O. Glauner"},{"@pid":"136/6173","text":"Jan Iwaszkiewicz"},{"@pid":"61/446","text":"Jean-Yves LeMeur"},{"@pid":"98/1923","text":"Tibor Simko"}]},"title":"Use of Solr and Xapian in the Invenio document repository software.","venue":"CoRR","volume":"abs/1310.0250","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GlaunerILS13","ee":"http://arxiv.org/abs/1310.0250","url":"https://dblp.org/rec/journals/corr/GlaunerILS13"}, "url":"URL#4253999" }, { "@score":"1", "@id":"4254001", "info":{"authors":{"author":{"@pid":"199/9541","text":"Andrew H. Gleibman"}},"title":"Object Recognition System Design in Computer Vision: a Universal Approach.","venue":"CoRR","volume":"abs/1310.7170","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gleibman13","ee":"http://arxiv.org/abs/1310.7170","url":"https://dblp.org/rec/journals/corr/Gleibman13"}, "url":"URL#4254001" }, { "@score":"1", "@id":"4254010", "info":{"authors":{"author":[{"@pid":"136/5675","text":"Etienne Z. Gnimpieba"},{"@pid":"56/439","text":"Douglas M. Jennewein"},{"@pid":"136/5659","text":"Luke Fuhrman"},{"@pid":"84/6686","text":"Carol Lushbough"}]},"title":"Bioinformatics Knowledge Transmission (training, learning, and teaching): overview and flexible comparison of computer based training approaches.","venue":"CoRR","volume":"abs/1310.8383","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GnimpiebaJFL13","ee":"http://arxiv.org/abs/1310.8383","url":"https://dblp.org/rec/journals/corr/GnimpiebaJFL13"}, "url":"URL#4254010" }, { "@score":"1", "@id":"4254011", "info":{"authors":{"author":[{"@pid":"73/5116","text":"Xavier Goaoc"},{"@pid":"136/5944","text":"Pavel Paták"},{"@pid":"163/1849","text":"Zuzana Safernová"},{"@pid":"29/3357","text":"Martin Tancer"},{"@pid":"65/3538-1","text":"Uli Wagner 0001"}]},"title":"Bounding Helly numbers via Betti numbers.","venue":"CoRR","volume":"abs/1310.4613","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoaocPSTW13","ee":"http://arxiv.org/abs/1310.4613","url":"https://dblp.org/rec/journals/corr/GoaocPSTW13"}, "url":"URL#4254011" }, { "@score":"1", "@id":"4254025", "info":{"authors":{"author":{"@pid":"15/5467","text":"Wojciech M. Golab"}},"title":"Deconstructing Queue-Based Mutual Exclusion.","venue":"CoRR","volume":"abs/1310.7397","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Golab13","ee":"http://arxiv.org/abs/1310.7397","url":"https://dblp.org/rec/journals/corr/Golab13"}, "url":"URL#4254025" }, { "@score":"1", "@id":"4254030", "info":{"authors":{"author":[{"@pid":"82/8334","text":"Mario Goldenbaum"},{"@pid":"39/3615","text":"Holger Boche"},{"@pid":"s/SlawomirStanczak","text":"Slawomir Stanczak"}]},"title":"Nomographic Functions: Efficient Computation in Clustered Gaussian Sensor Networks.","venue":"CoRR","volume":"abs/1310.7123","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoldenbaumBS13","ee":"http://arxiv.org/abs/1310.7123","url":"https://dblp.org/rec/journals/corr/GoldenbaumBS13"}, "url":"URL#4254030" }, { "@score":"1", "@id":"4254036", "info":{"authors":{"author":{"@pid":"136/5795","text":"P. A. Golovinski"}},"title":"Scenarios of Destruction for Large Network and Increasing Reliability.","venue":"CoRR","volume":"abs/1310.2468","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Golovinski13","ee":"http://arxiv.org/abs/1310.2468","url":"https://dblp.org/rec/journals/corr/Golovinski13"}, "url":"URL#4254036" }, { "@score":"1", "@id":"4254037", "info":{"authors":{"author":[{"@pid":"136/5795","text":"P. A. Golovinski"},{"@pid":"136/5886","text":"V. A. Astapenko"}]},"title":"The complex-valued encoding for dicision-making based on aliasing data.","venue":"CoRR","volume":"abs/1310.0365","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GolovinskiA13","ee":"http://arxiv.org/abs/1310.0365","url":"https://dblp.org/rec/journals/corr/GolovinskiA13"}, "url":"URL#4254037" }, { "@score":"1", "@id":"4254043", "info":{"authors":{"author":[{"@pid":"36/9509","text":"Yannai A. Gonczarowski"},{"@pid":"81/49","text":"Yoram Moses"}]},"title":"Timely Common Knowledge.","venue":"CoRR","volume":"abs/1310.6414","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GonczarowskiM13","ee":"http://arxiv.org/abs/1310.6414","url":"https://dblp.org/rec/journals/corr/GonczarowskiM13"}, "url":"URL#4254043" }, { "@score":"1", "@id":"4254059", "info":{"authors":{"author":[{"@pid":"58/10836","text":"Mathew Goonewardena"},{"@pid":"68/3340","text":"Xin Jin"},{"@pid":"56/4552","text":"Wessam Ajib"},{"@pid":"53/815","text":"Halima Elbiaze"}]},"title":"Competition vs. Cooperation: A Game-Theoretic Decision Analysis for MIMO HetNets.","venue":"CoRR","volume":"abs/1310.4162","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoonewardenaJAE13","ee":"http://arxiv.org/abs/1310.4162","url":"https://dblp.org/rec/journals/corr/GoonewardenaJAE13"}, "url":"URL#4254059" }, { "@score":"1", "@id":"4254072", "info":{"authors":{"author":[{"@pid":"47/11432","text":"Christoph Göring"},{"@pid":"119/1465","text":"Alexander Freytag"},{"@pid":"90/5428","text":"Erik Rodner"},{"@pid":"d/JoachimDenzler","text":"Joachim Denzler"}]},"title":"Fine-grained Categorization - Short Summary of our Entry for the ImageNet Challenge 2012.","venue":"CoRR","volume":"abs/1310.4759","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoringFRD13","ee":"http://arxiv.org/abs/1310.4759","url":"https://dblp.org/rec/journals/corr/GoringFRD13"}, "url":"URL#4254072" }, { "@score":"1", "@id":"4254075", "info":{"authors":{"author":{"@pid":"136/5610","text":"Sean P. Gorman"}},"title":"The Danger of a Big Data Episteme and the Need to Evolve GIS.","venue":"CoRR","volume":"abs/1310.4411","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gorman13","ee":"http://arxiv.org/abs/1310.4411","url":"https://dblp.org/rec/journals/corr/Gorman13"}, "url":"URL#4254075" }, { "@score":"1", "@id":"4254080", "info":{"authors":{"author":[{"@pid":"95/9232","text":"Keisuke Goto 0001"},{"@pid":"44/2355","text":"Hideo Bannai"}]},"title":"Space Efficient Linear Time Lempel-Ziv Factorization on Constant~Size~Alphabets.","venue":"CoRR","volume":"abs/1310.1448","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GotoB13","ee":"http://arxiv.org/abs/1310.1448","url":"https://dblp.org/rec/journals/corr/GotoB13"}, "url":"URL#4254080" }, { "@score":"1", "@id":"4254117", "info":{"authors":{"author":[{"@pid":"47/5412","text":"Robert B. Gramacy"},{"@pid":"77/59","text":"Jarad Niemi"},{"@pid":"136/5983","text":"Robin Weiss"}]},"title":"Massively parallel approximate Gaussian process regression.","venue":"CoRR","volume":"abs/1310.5182","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GramacyNW13","ee":"http://arxiv.org/abs/1310.5182","url":"https://dblp.org/rec/journals/corr/GramacyNW13"}, "url":"URL#4254117" }, { "@score":"1", "@id":"4254121", "info":{"authors":{"author":[{"@pid":"136/5722","text":"Giulio Grassi"},{"@pid":"39/11297","text":"Davide Pesavento"},{"@pid":"66/11343","text":"Lucas Wang"},{"@pid":"87/6423","text":"Giovanni Pau 0001"},{"@pid":"69/1971","text":"Rama Vuyyuru"},{"@pid":"85/4258","text":"Ryuji Wakikawa"},{"@pid":"z/LixiaZhang1","text":"Lixia Zhang 0001"}]},"title":"Vehicular Inter-Networking via Named Data.","venue":"CoRR","volume":"abs/1310.5980","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrassiPWPVW013","ee":"http://arxiv.org/abs/1310.5980","url":"https://dblp.org/rec/journals/corr/GrassiPWPVW013"}, "url":"URL#4254121" }, { "@score":"1", "@id":"4254122", "info":{"authors":{"author":[{"@pid":"95/1898","text":"Markus Grassl"},{"@pid":"s/PeterWShor","text":"Peter W. Shor"},{"@pid":"317/7353-2","text":"Graeme Smith 0002"},{"@pid":"60/3047","text":"John A. Smolin"},{"@pid":"33/1205","text":"Bei Zeng"}]},"title":"New Constructions of Codes for Asymmetric Channels via Concatenation.","venue":"CoRR","volume":"abs/1310.7536","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrasslSSSZ13","ee":"http://arxiv.org/abs/1310.7536","url":"https://dblp.org/rec/journals/corr/GrasslSSSZ13"}, "url":"URL#4254122" }, { "@score":"1", "@id":"4254137", "info":{"authors":{"author":[{"@pid":"131/6805","text":"Jean Gregoire"},{"@pid":"78/7143","text":"Silvère Bonnabel"},{"@pid":"45/5579","text":"Arnaud de La Fortelle"}]},"title":"Priority-based intersection management with kinodynamic constraints.","venue":"CoRR","volume":"abs/1310.5828","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GregoireBF13a","ee":"http://arxiv.org/abs/1310.5828","url":"https://dblp.org/rec/journals/corr/GregoireBF13a"}, "url":"URL#4254137" }, { "@score":"1", "@id":"4254138", "info":{"authors":{"author":[{"@pid":"131/6805","text":"Jean Gregoire"},{"@pid":"78/7143","text":"Silvère Bonnabel"},{"@pid":"45/5579","text":"Arnaud de La Fortelle"}]},"title":"Optimal cooperative motion planning for vehicles at intersections.","venue":"CoRR","volume":"abs/1310.7729","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GregoireBF13b","ee":"http://arxiv.org/abs/1310.7729","url":"https://dblp.org/rec/journals/corr/GregoireBF13b"}, "url":"URL#4254138" }, { "@score":"1", "@id":"4254141", "info":{"authors":{"author":[{"@pid":"51/7660","text":"Karol Gregor"},{"@pid":"23/1295","text":"Andriy Mnih"},{"@pid":"65/6056","text":"Daan Wierstra"}]},"title":"Deep AutoRegressive Networks.","venue":"CoRR","volume":"abs/1310.8499","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GregorMW13","ee":"http://arxiv.org/abs/1310.8499","url":"https://dblp.org/rec/journals/corr/GregorMW13"}, "url":"URL#4254141" }, { "@score":"1", "@id":"4254145", "info":{"authors":{"author":[{"@pid":"136/5828","text":"Igor Gridchyn"},{"@pid":"89/3764","text":"Vladimir Kolmogorov"}]},"title":"Potts model, parametric maxflow and k-submodular functions.","venue":"CoRR","volume":"abs/1310.1771","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GridchynK13","ee":"http://arxiv.org/abs/1310.1771","url":"https://dblp.org/rec/journals/corr/GridchynK13"}, "url":"URL#4254145" }, { "@score":"1", "@id":"4254149", "info":{"authors":{"author":[{"@pid":"89/5030","text":"Virgil Griffith"},{"@pid":"89/2389","text":"Edwin K. P. Chong"},{"@pid":"75/8316","text":"Ryan G. James"},{"@pid":"05/4176","text":"Christopher J. Ellison"},{"@pid":"16/6123","text":"James P. Crutchfield"}]},"title":"Intersection Information based on Common Randomness.","venue":"CoRR","volume":"abs/1310.1538","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GriffithCJEC13","ee":"http://arxiv.org/abs/1310.1538","url":"https://dblp.org/rec/journals/corr/GriffithCJEC13"}, "url":"URL#4254149" }, { "@score":"1", "@id":"4254157", "info":{"authors":{"author":{"@pid":"136/6096","text":"Andrey Gritsenko"}},"title":"A Workflow-Forecast Approach To The Task Scheduling Problem In Distributed Computing Systems.","venue":"CoRR","volume":"abs/1310.1553","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gritsenko13","ee":"http://arxiv.org/abs/1310.1553","url":"https://dblp.org/rec/journals/corr/Gritsenko13"}, "url":"URL#4254157" }, { "@score":"1", "@id":"4254164", "info":{"authors":{"author":[{"@pid":"53/2766-3","text":"David Gross 0003"},{"@pid":"17/7802","text":"Felix Krahmer"},{"@pid":"95/11466","text":"Richard Kueng"}]},"title":"A Partial Derandomization of PhaseLift using Spherical Designs.","venue":"CoRR","volume":"abs/1310.2267","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrossKK13","ee":"http://arxiv.org/abs/1310.2267","url":"https://dblp.org/rec/journals/corr/GrossKK13"}, "url":"URL#4254164" }, { "@score":"1", "@id":"4254165", "info":{"authors":{"author":[{"@pid":"21/782","text":"Davide Grossi"},{"@pid":"43/6250","text":"Emiliano Lorini"},{"@pid":"35/485","text":"François Schwarzentruber"}]},"title":"Ceteris Paribus Structure in Logics of Game Forms.","venue":"CoRR","volume":"abs/1310.6416","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrossiLS13","ee":"http://arxiv.org/abs/1310.6416","url":"https://dblp.org/rec/journals/corr/GrossiLS13"}, "url":"URL#4254165" }, { "@score":"1", "@id":"4254179", "info":{"authors":{"author":[{"@pid":"93/3905-1","text":"Peng Guan 0001"},{"@pid":"91/6905","text":"Maxim Raginsky"},{"@pid":"w/RebeccaWillett","text":"Rebecca Willett"}]},"title":"Relax but stay in control: from value to algorithms for online Markov decision processes.","venue":"CoRR","volume":"abs/1310.7300","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuanRW13","ee":"http://arxiv.org/abs/1310.7300","url":"https://dblp.org/rec/journals/corr/GuanRW13"}, "url":"URL#4254179" }, { "@score":"1", "@id":"4254181", "info":{"authors":{"author":{"@pid":"172/1260","text":"Giuliano Gadioli La Guardia"}},"title":"On Negacyclic MDS-Convolutional Codes.","venue":"CoRR","volume":"abs/1310.3265","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Guardia13","ee":"http://arxiv.org/abs/1310.3265","url":"https://dblp.org/rec/journals/corr/Guardia13"}, "url":"URL#4254181" }, { "@score":"1", "@id":"4254185", "info":{"authors":{"author":[{"@pid":"56/1310-5","text":"Michael Günther 0005"},{"@pid":"89/2975","text":"Adrian Sandu"}]},"title":"Multirate generalized additive Runge Kutta methods.","venue":"CoRR","volume":"abs/1310.6055","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuentherS13","ee":"http://arxiv.org/abs/1310.6055","url":"https://dblp.org/rec/journals/corr/GuentherS13"}, "url":"URL#4254185" }, { "@score":"1", "@id":"4254186", "info":{"authors":{"author":[{"@pid":"15/745","text":"Roch Guérin"},{"@pid":"52/6825","text":"Jaudelice Cavalcante de Oliveira"},{"@pid":"220/6991","text":"Steven Weber 0001"}]},"title":"Adoption of bundled services with network externalities and correlated affinities.","venue":"CoRR","volume":"abs/1310.4429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuerinOW13","ee":"http://arxiv.org/abs/1310.4429","url":"https://dblp.org/rec/journals/corr/GuerinOW13"}, "url":"URL#4254186" }, { "@score":"1", "@id":"4254189", "info":{"authors":{"author":[{"@pid":"136/5857","text":"Thomas Gueudré"},{"@pid":"136/5876","text":"Alexander Dobrinevski"},{"@pid":"82/11030","text":"Jean-Philippe Bouchaud"}]},"title":"Explore or exploit? A generic model and an exactly solvable case.","venue":"CoRR","volume":"abs/1310.5114","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GueudreDB13","ee":"http://arxiv.org/abs/1310.5114","url":"https://dblp.org/rec/journals/corr/GueudreDB13"}, "url":"URL#4254189" }, { "@score":"1", "@id":"4254197", "info":{"authors":{"author":[{"@pid":"74/1747","text":"Maxime Guillaud"},{"@pid":"117/3873","text":"Mohsen Rezaee"},{"@pid":"15/1985","text":"Gerald Matz"}]},"title":"Interference Alignment via Message-Passing.","venue":"CoRR","volume":"abs/1310.2435","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuillaudRM13","ee":"http://arxiv.org/abs/1310.2435","url":"https://dblp.org/rec/journals/corr/GuillaudRM13"}, "url":"URL#4254197" }, { "@score":"1", "@id":"4254202", "info":{"authors":{"author":[{"@pid":"00/6653","text":"Joan Guisado-Gámez"},{"@pid":"58/2864","text":"David Dominguez-Sal"},{"@pid":"03/5767","text":"Josep Lluís Larriba-Pey"}]},"title":"Massive Query Expansion by Exploiting Graph Knowledge Bases.","venue":"CoRR","volume":"abs/1310.5698","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Guisado-GamezDL13","ee":"http://arxiv.org/abs/1310.5698","url":"https://dblp.org/rec/journals/corr/Guisado-GamezDL13"}, "url":"URL#4254202" }, { "@score":"1", "@id":"4254215", "info":{"authors":{"author":[{"@pid":"124/6628","text":"Han Guo"},{"@pid":"67/8054","text":"Chenlu Qiu"},{"@pid":"v/NamrataVaswani","text":"Namrata Vaswani"}]},"title":"Practical ReProCS for Separating Sparse and Low-dimensional Signal Sequences from their Sum.","venue":"CoRR","volume":"abs/1310.4261","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoQV13","ee":"http://arxiv.org/abs/1310.4261","url":"https://dblp.org/rec/journals/corr/GuoQV13"}, "url":"URL#4254215" }, { "@score":"1", "@id":"4254223", "info":{"authors":{"author":[{"@pid":"12/3320","text":"Gaurav Gupta"},{"@pid":"61/1512","text":"Ajit Kumar Chaturvedi"}]},"title":"User Selection in MIMO Interfering Broadcast Channels.","venue":"CoRR","volume":"abs/1310.7425","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaC13","ee":"http://arxiv.org/abs/1310.7425","url":"https://dblp.org/rec/journals/corr/GuptaC13"}, "url":"URL#4254223" }, { "@score":"1", "@id":"4254224", "info":{"authors":{"author":[{"@pid":"12/3320","text":"Gaurav Gupta"},{"@pid":"61/1512","text":"Ajit Kumar Chaturvedi"}]},"title":"Conditional Entropy based User Selection for Multiuser MIMO Systems.","venue":"CoRR","volume":"abs/1310.7852","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaC13a","ee":"http://arxiv.org/abs/1310.7852","url":"https://dblp.org/rec/journals/corr/GuptaC13a"}, "url":"URL#4254224" }, { "@score":"1", "@id":"4254225", "info":{"authors":{"author":[{"@pid":"136/5712","text":"Abhishek K. Gupta"},{"@pid":"80/7909","text":"Harpreet S. Dhillon"},{"@pid":"71/2804","text":"Sriram Vishwanath"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"}]},"title":"Downlink MIMO HetNets with Load Balancing.","venue":"CoRR","volume":"abs/1310.6795","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaDVA13","ee":"http://arxiv.org/abs/1310.6795","url":"https://dblp.org/rec/journals/corr/GuptaDVA13"}, "url":"URL#4254225" }, { "@score":"1", "@id":"4254226", "info":{"authors":{"author":[{"@pid":"136/5654","text":"Hitesh Gupta"},{"@pid":"29/8675","text":"S. C. Jain"}]},"title":"Multivalued Logic Circuit Design for Binary Logic Interface.","venue":"CoRR","volume":"abs/1310.5697","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaJ13","ee":"http://arxiv.org/abs/1310.5697","url":"https://dblp.org/rec/journals/corr/GuptaJ13"}, "url":"URL#4254226" }, { "@score":"1", "@id":"4254228", "info":{"authors":{"author":[{"@pid":"136/5799","text":"Vaishali Gupta"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Subjective and Objective Evaluation of English to Urdu Machine Translation.","venue":"CoRR","volume":"abs/1310.0578","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaJM13a","ee":"http://arxiv.org/abs/1310.0578","url":"https://dblp.org/rec/journals/corr/GuptaJM13a"}, "url":"URL#4254228" }, { "@score":"1", "@id":"4254229", "info":{"authors":{"author":[{"@pid":"136/5799","text":"Vaishali Gupta"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Rule Based Stemmer in Urdu.","venue":"CoRR","volume":"abs/1310.0581","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaJM13b","ee":"http://arxiv.org/abs/1310.0581","url":"https://dblp.org/rec/journals/corr/GuptaJM13b"}, "url":"URL#4254229" }, { "@score":"1", "@id":"4254234", "info":{"authors":{"author":[{"@pid":"59/9057","text":"Ruchir Gupta"},{"@pid":"136/5758","text":"Abhijeet C. Maali"},{"@pid":"23/560","text":"Yatindra Nath Singh"}]},"title":"Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks.","venue":"CoRR","volume":"abs/1310.5985","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaMS13","ee":"http://arxiv.org/abs/1310.5985","url":"https://dblp.org/rec/journals/corr/GuptaMS13"}, "url":"URL#4254234" }, { "@score":"1", "@id":"4254236", "info":{"authors":{"author":[{"@pid":"136/5662","text":"Suyash Gupta"},{"@pid":"20/3315","text":"V. Krishna Nandivada"}]},"title":"IMSuite: A Benchmark Suite for Simulating Distributed Algorithms.","venue":"CoRR","volume":"abs/1310.2814","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaN13a","ee":"http://arxiv.org/abs/1310.2814","url":"https://dblp.org/rec/journals/corr/GuptaN13a"}, "url":"URL#4254236" }, { "@score":"1", "@id":"4254245", "info":{"authors":{"author":[{"@pid":"74/9963","text":"Vikash Gupta"},{"@pid":"136/5670","text":"Hari K. Voruganti"},{"@pid":"94/482","text":"Bhaskar Dasgupta"}]},"title":"Domain Mapping for Volumetric Parameterization using Harmonic Functions.","venue":"CoRR","volume":"abs/1310.6894","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaVD13","ee":"http://arxiv.org/abs/1310.6894","url":"https://dblp.org/rec/journals/corr/GuptaVD13"}, "url":"URL#4254245" }, { "@score":"1", "@id":"4254246", "info":{"authors":{"author":[{"@pid":"70/6471-3","text":"Manish K. Gupta 0003"},{"@pid":"74/6317","text":"Mark M. Wilde"}]},"title":"Multiplicativity of completely bounded $p$-norms implies a strong converse for entanglement-assisted capacity.","venue":"CoRR","volume":"abs/1310.7028","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaW13","ee":"http://arxiv.org/abs/1310.7028","url":"https://dblp.org/rec/journals/corr/GuptaW13"}, "url":"URL#4254246" }, { "@score":"1", "@id":"4254258", "info":{"authors":{"author":[{"@pid":"93/11267","text":"Matthew Gwynne"},{"@pid":"23/1836","text":"Oliver Kullmann"}]},"title":"Trading inference effort versus size in CNF Knowledge Compilation.","venue":"CoRR","volume":"abs/1310.5746","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/GwynneK13a","ee":"http://arxiv.org/abs/1310.5746","url":"https://dblp.org/rec/journals/corr/GwynneK13a"}, "url":"URL#4254258" }, { "@score":"1", "@id":"4254260", "info":{"authors":{"author":{"@pid":"17/8035","text":"Laszlo Gyongyosi"}},"title":"Adaptive Multicarrier Quadrature Division Modulation for Continuous-Variable Quantum Key Distribution.","venue":"CoRR","volume":"abs/1310.1608","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gyongyosi13a","ee":"http://arxiv.org/abs/1310.1608","url":"https://dblp.org/rec/journals/corr/Gyongyosi13a"}, "url":"URL#4254260" }, { "@score":"1", "@id":"4254261", "info":{"authors":{"author":{"@pid":"17/8035","text":"Laszlo Gyongyosi"}},"title":"Quantum Imaging of High-Dimensional Hilbert Spaces with Radon Transform.","venue":"CoRR","volume":"abs/1310.8347","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gyongyosi13b","ee":"http://arxiv.org/abs/1310.8347","url":"https://dblp.org/rec/journals/corr/Gyongyosi13b"}, "url":"URL#4254261" }, { "@score":"1", "@id":"4254269", "info":{"authors":{"author":{"@pid":"130/5222","text":"Miha E. Habic"}},"title":"Cardinal-Recognizing Infinite Time Turing Machines.","venue":"CoRR","volume":"abs/1310.5590","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Habic13","ee":"http://arxiv.org/abs/1310.5590","url":"https://dblp.org/rec/journals/corr/Habic13"}, "url":"URL#4254269" }, { "@score":"1", "@id":"4254271", "info":{"authors":{"author":[{"@pid":"99/5516","text":"Majed Haddad"},{"@pid":"32/7511","text":"Piotr Wiecek"},{"@pid":"27/9717","text":"Oussama Habachi"}]},"title":"A Game Theoretic Analysis for Energy Efficient Heterogeneous Networks.","venue":"CoRR","volume":"abs/1310.3883","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaddadWH13","ee":"http://arxiv.org/abs/1310.3883","url":"https://dblp.org/rec/journals/corr/HaddadWH13"}, "url":"URL#4254271" }, { "@score":"1", "@id":"4254279", "info":{"authors":{"author":{"@pid":"59/4321","text":"Matthew Hague"}},"title":"Saturation of Concurrent Collapsible Pushdown Systems.","venue":"CoRR","volume":"abs/1310.2631","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hague13","ee":"http://arxiv.org/abs/1310.2631","url":"https://dblp.org/rec/journals/corr/Hague13"}, "url":"URL#4254279" }, { "@score":"1", "@id":"4254290", "info":{"authors":{"author":[{"@pid":"334/4488","text":"Mohammad Taghi Hajiaghayi"},{"@pid":"75/5758","text":"Rohit Khandekar"},{"@pid":"80/4876","text":"Guy Kortsarz"}]},"title":"The Foundations of Fixed Parameter Inapproximability.","venue":"CoRR","volume":"abs/1310.2711","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HajiaghayiKK13","ee":"http://arxiv.org/abs/1310.2711","url":"https://dblp.org/rec/journals/corr/HajiaghayiKK13"}, "url":"URL#4254290" }, { "@score":"1", "@id":"4254296", "info":{"authors":{"author":[{"@pid":"15/10748","text":"Wael Halbawi"},{"@pid":"31/2709","text":"Tracey Ho"},{"@pid":"74/3592","text":"Hongyi Yao"},{"@pid":"67/5690","text":"Iwan M. Duursma"}]},"title":"Distributed Reed-Solomon Codes for Simple Multiple Access Networks.","venue":"CoRR","volume":"abs/1310.5187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HalbawiHYD13","ee":"http://arxiv.org/abs/1310.5187","url":"https://dblp.org/rec/journals/corr/HalbawiHYD13"}, "url":"URL#4254296" }, { "@score":"1", "@id":"4254308", "info":{"authors":{"author":[{"@pid":"h/JosephYHalpern","text":"Joseph Y. Halpern"},{"@pid":"p/RPass","text":"Rafael Pass"}]},"title":"Game Theory with Translucent Players.","venue":"CoRR","volume":"abs/1310.6438","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HalpernP13a","ee":"http://arxiv.org/abs/1310.6438","url":"https://dblp.org/rec/journals/corr/HalpernP13a"}, "url":"URL#4254308" }, { "@score":"1", "@id":"4254314", "info":{"authors":{"author":[{"@pid":"136/5987","text":"V. Halyo"},{"@pid":"73/7575","text":"Patrick LeGresley"},{"@pid":"43/947","text":"P. Lujan"},{"@pid":"136/5986","text":"V. Karpusenko"},{"@pid":"136/5690","text":"A. Vladimirov"}]},"title":"First Evaluation of the CPU, GPGPU and MIC Architectures for Real Time Particle Tracking based on Hough Transform at the LHC.","venue":"CoRR","volume":"abs/1310.7556","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HalyoLLKV13","ee":"http://arxiv.org/abs/1310.7556","url":"https://dblp.org/rec/journals/corr/HalyoLLKV13"}, "url":"URL#4254314" }, { "@score":"1", "@id":"4254319", "info":{"authors":{"author":[{"@pid":"136/5854","text":"Aya Hamed"},{"@pid":"65/3040","text":"Troy Lee"}]},"title":"Rank and fooling set size.","venue":"CoRR","volume":"abs/1310.7321","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HamedL13","ee":"http://arxiv.org/abs/1310.7321","url":"https://dblp.org/rec/journals/corr/HamedL13"}, "url":"URL#4254319" }, { "@score":"1", "@id":"4254328", "info":{"authors":{"author":[{"@pid":"136/5636","text":"Zhong-Lin Han"},{"@pid":"88/7130","text":"Yu-jian Li"},{"@pid":"45/4425","text":"Bing-Hong Wang"}]},"title":"Opinion Dynamic with agents immigration.","venue":"CoRR","volume":"abs/1310.5096","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HanLW13","ee":"http://arxiv.org/abs/1310.5096","url":"https://dblp.org/rec/journals/corr/HanLW13"}, "url":"URL#4254328" }, { "@score":"1", "@id":"4254339", "info":{"authors":{"author":[{"@pid":"52/8605","text":"Chenxi Hao"},{"@pid":"86/5737","text":"Bruno Clerckx"}]},"title":"MISO Broadcast Channel with Imperfect and (Un)matched CSIT in the Frequency Domain: DoF Region and Transmission Strategies.","venue":"CoRR","volume":"abs/1310.6657","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaoC13","ee":"http://arxiv.org/abs/1310.6657","url":"https://dblp.org/rec/journals/corr/HaoC13"}, "url":"URL#4254339" }, { "@score":"1", "@id":"4254340", "info":{"authors":{"author":[{"@pid":"52/8605","text":"Chenxi Hao"},{"@pid":"118/5829","text":"Borzoo Rassouli"},{"@pid":"86/5737","text":"Bruno Clerckx"}]},"title":"Degrees-of-Freedom Region of MISO-OFDMA Broadcast Channel with Imperfect CSIT.","venue":"CoRR","volume":"abs/1310.6669","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaoRC13","ee":"http://arxiv.org/abs/1310.6669","url":"https://dblp.org/rec/journals/corr/HaoRC13"}, "url":"URL#4254340" }, { "@score":"1", "@id":"4254343", "info":{"authors":{"author":[{"@pid":"130/0877","text":"Keisuke Hara"},{"@pid":"56/5382","text":"Tomihisa Kamada"}]},"title":"A two-step model and the algorithm for recalling in recommender systems.","venue":"CoRR","volume":"abs/1310.6110","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaraK13","ee":"http://arxiv.org/abs/1310.6110","url":"https://dblp.org/rec/journals/corr/HaraK13"}, "url":"URL#4254343" }, { "@score":"1", "@id":"4254344", "info":{"authors":{"author":[{"@pid":"92/5921","text":"Mehrtash Tafazzoli Harandi"},{"@pid":"64/803","text":"Conrad Sanderson"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"09/2347","text":"Brian C. Lovell"}]},"title":"Dictionary Learning and Sparse Coding on Grassmann Manifolds: An Extrinsic Solution.","venue":"CoRR","volume":"abs/1310.4891","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarandiSSL13","ee":"http://arxiv.org/abs/1310.4891","url":"https://dblp.org/rec/journals/corr/HarandiSSL13"}, "url":"URL#4254344" }, { "@score":"1", "@id":"4254349", "info":{"authors":{"author":[{"@pid":"134/9890","text":"Sébastien Harispe"},{"@pid":"17/3509","text":"Sylvie Ranwez"},{"@pid":"65/686","text":"Stefan Janaqi"},{"@pid":"77/5001","text":"Jacky Montmain"}]},"title":"Semantic Measures for the Comparison of Units of Language, Concepts or Entities from Text and Knowledge Base Analysis.","venue":"CoRR","volume":"abs/1310.1285","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarispeRJM13","ee":"http://arxiv.org/abs/1310.1285","url":"https://dblp.org/rec/journals/corr/HarispeRJM13"}, "url":"URL#4254349" }, { "@score":"1", "@id":"4254363", "info":{"authors":{"author":[{"@pid":"99/7187","text":"Tanja Hartmann"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"}]},"title":"Dynamic Gomory-Hu Tree Construction - fast and simple.","venue":"CoRR","volume":"abs/1310.0178","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HartmannW13","ee":"http://arxiv.org/abs/1310.0178","url":"https://dblp.org/rec/journals/corr/HartmannW13"}, "url":"URL#4254363" }, { "@score":"1", "@id":"4254365", "info":{"authors":{"author":[{"@pid":"136/5764","text":"Annemarie Harzl"},{"@pid":"136/5754","text":"Philipp Neidhoefer"},{"@pid":"136/5946","text":"Valentin Rock"},{"@pid":"136/6072","text":"Maximilian Schafzahl"},{"@pid":"s/WolfgangSlany","text":"Wolfgang Slany"}]},"title":"A Scratch-like visual programming system for Microsoft Windows Phone 8.","venue":"CoRR","volume":"abs/1310.1390","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarzlNRSS13","ee":"http://arxiv.org/abs/1310.1390","url":"https://dblp.org/rec/journals/corr/HarzlNRSS13"}, "url":"URL#4254365" }, { "@score":"1", "@id":"4254367", "info":{"authors":{"author":[{"@pid":"94/5822","text":"Satoshi Hasegawa"},{"@pid":"136/5892","text":"Hajime Anada"},{"@pid":"66/2462","text":"Shuya Kanagawa"}]},"title":"Pursuit Fractal Analysis of Time-Series Data.","venue":"CoRR","volume":"abs/1310.3564","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HasegawaAK13","ee":"http://arxiv.org/abs/1310.3564","url":"https://dblp.org/rec/journals/corr/HasegawaAK13"}, "url":"URL#4254367" }, { "@score":"1", "@id":"4254369", "info":{"authors":{"author":[{"@pid":"72/7271","text":"Marcelo Hashimoto"},{"@pid":"c/RobertoMarcondesCesarJunior","text":"Roberto Marcondes Cesar Junior"}]},"title":"Object Detection Using Keygraphs.","venue":"CoRR","volume":"abs/1310.0171","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HashimotoJ13","ee":"http://arxiv.org/abs/1310.0171","url":"https://dblp.org/rec/journals/corr/HashimotoJ13"}, "url":"URL#4254369" }, { "@score":"1", "@id":"4254374", "info":{"authors":{"author":[{"@pid":"35/9943","text":"Foyzul Hassan"},{"@pid":"10/9944","text":"Mohammed Rokibul Alam Kotwal"},{"@pid":"47/7533","text":"Md. Mostafizur Rahman"},{"@pid":"23/10123","text":"Mohammad Nasiruddin"},{"@pid":"77/10122","text":"Md. Abdul Latif"},{"@pid":"59/6152","text":"Mohammad Nurul Huda"}]},"title":"Local Feature or Mel Frequency Cepstral Coefficients - Which One is Better for MLN-Based Bangla Speech Recognition?","venue":"CoRR","volume":"abs/1310.1426","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HassanKRNLH13","ee":"http://arxiv.org/abs/1310.1426","url":"https://dblp.org/rec/journals/corr/HassanKRNLH13"}, "url":"URL#4254374" }, { "@score":"1", "@id":"4254376", "info":{"authors":{"author":[{"@pid":"09/1803","text":"Babak Hassibi"},{"@pid":"34/2416","text":"Morten Hansen"},{"@pid":"19/5000","text":"Alexandros G. Dimakis"},{"@pid":"136/5769","text":"Haider Ali Jasim Alshamary"},{"@pid":"57/6928","text":"Weiyu Xu"}]},"title":"Optimized Markov Chain Monte Carlo for Signal Detection in MIMO Systems: an Analysis of Stationary Distribution and Mixing Time.","venue":"CoRR","volume":"abs/1310.7305","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HassibiHDAX13","ee":"http://arxiv.org/abs/1310.7305","url":"https://dblp.org/rec/journals/corr/HassibiHDAX13"}, "url":"URL#4254376" }, { "@score":"1", "@id":"4254383", "info":{"authors":{"author":{"@pid":"54/7928","text":"J. H. van Hateren"}},"title":"Active causation and the origin of meaning.","venue":"CoRR","volume":"abs/1310.2063","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hateren13","ee":"http://arxiv.org/abs/1310.2063","url":"https://dblp.org/rec/journals/corr/Hateren13"}, "url":"URL#4254383" }, { "@score":"1", "@id":"4254386", "info":{"authors":{"author":[{"@pid":"05/6200","text":"Veria Havary-Nassab"},{"@pid":"91/6648","text":"Shahram Shahbazpanahi"},{"@pid":"82/3084","text":"Shahrokh Valaee"}]},"title":"Mobility Diversity in Mobile Wireless Networks.","venue":"CoRR","volume":"abs/1310.1833","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Havary-NassabSV13","ee":"http://arxiv.org/abs/1310.1833","url":"https://dblp.org/rec/journals/corr/Havary-NassabSV13"}, "url":"URL#4254386" }, { "@score":"1", "@id":"4254390", "info":{"authors":{"author":{"@pid":"69/1238","text":"David Haws"}},"title":"QuickLexSort: An efficient algorithm for lexicographically sorting nested restrictions of a database.","venue":"CoRR","volume":"abs/1310.1649","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haws13","ee":"http://arxiv.org/abs/1310.1649","url":"https://dblp.org/rec/journals/corr/Haws13"}, "url":"URL#4254390" }, { "@score":"1", "@id":"4254394", "info":{"authors":{"author":[{"@pid":"143/5786","text":"David P. Hayden"},{"@pid":"33/6315-2","text":"Ye Yuan 0002"},{"@pid":"76/7143","text":"Jorge M. Gonçalves"}]},"title":"Network Reconstruction from Intrinsic Noise.","venue":"CoRR","volume":"abs/1310.0375","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaydenYG13","ee":"http://arxiv.org/abs/1310.0375","url":"https://dblp.org/rec/journals/corr/HaydenYG13"}, "url":"URL#4254394" }, { "@score":"1", "@id":"4254400", "info":{"authors":{"author":[{"@pid":"65/9245","text":"Shiwen He"},{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"90/3246","text":"Luxi Yang"}]},"title":"Coordinated Beamforming for Energy Efficient Transmission in Multicell Multiuser Systems.","venue":"CoRR","volume":"abs/1310.2037","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeHJY13","ee":"http://arxiv.org/abs/1310.2037","url":"https://dblp.org/rec/journals/corr/HeHJY13"}, "url":"URL#4254400" }, { "@score":"1", "@id":"4254401", "info":{"authors":{"author":[{"@pid":"65/9245","text":"Shiwen He"},{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"49/5340-2","text":"Shi Jin 0002"},{"@pid":"08/3571-3","text":"Fei Yu 0003"},{"@pid":"90/3246","text":"Luxi Yang"}]},"title":"Max-Min Energy Efficient Beamforming for Multicell Multiuser Joint Transmission Systems.","venue":"CoRR","volume":"abs/1310.2703","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeHJYY13","ee":"http://arxiv.org/abs/1310.2703","url":"https://dblp.org/rec/journals/corr/HeHJYY13"}, "url":"URL#4254401" }, { "@score":"1", "@id":"4254408", "info":{"authors":{"author":[{"@pid":"77/2036-1","text":"Dan He 0001"},{"@pid":"r/IrinaRish","text":"Irina Rish"},{"@pid":"69/1238","text":"David Haws"},{"@pid":"136/5905","text":"Simon Teyssedre"},{"@pid":"132/9820","text":"Zivan Karaman"},{"@pid":"61/5722","text":"Laxmi Parida"}]},"title":"MINT: Mutual Information based Transductive Feature Selection for Genetic Trait Prediction.","venue":"CoRR","volume":"abs/1310.1659","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeRHTKP13","ee":"http://arxiv.org/abs/1310.1659","url":"https://dblp.org/rec/journals/corr/HeRHTKP13"}, "url":"URL#4254408" }, { "@score":"1", "@id":"4254417", "info":{"authors":{"author":[{"@pid":"131/5106","text":"Blake A. Hechtman"},{"@pid":"27/2064","text":"Daniel J. Sorin"}]},"title":"Evaluating Cache Coherent Shared Virtual Memory for Heterogeneous Multicore Chips.","venue":"CoRR","volume":"abs/1310.7792","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HechtmanS13","ee":"http://arxiv.org/abs/1310.7792","url":"https://dblp.org/rec/journals/corr/HechtmanS13"}, "url":"URL#4254417" }, { "@score":"1", "@id":"4254429", "info":{"authors":{"author":[{"@pid":"117/9980","text":"Albert Heinle"},{"@pid":"34/2162","text":"Viktor Levandovskyy"},{"@pid":"136/6148","text":"Andreas Nareike"}]},"title":"SymbolicData: SDEval - Benchmarking for Everyone.","venue":"CoRR","volume":"abs/1310.5551","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeinleLN13","ee":"http://arxiv.org/abs/1310.5551","url":"https://dblp.org/rec/journals/corr/HeinleLN13"}, "url":"URL#4254429" }, { "@score":"1", "@id":"4254434", "info":{"authors":{"author":{"@pid":"78/6036","text":"Dirk Helbing"}},"title":"New Ways to Promote Sustainability and Social Well-Being in a Complex, Strongly Interdependent World: The FuturICT Approach.","venue":"CoRR","volume":"abs/1310.3498","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Helbing13b","ee":"http://arxiv.org/abs/1310.3498","url":"https://dblp.org/rec/journals/corr/Helbing13b"}, "url":"URL#4254434" }, { "@score":"1", "@id":"4254435", "info":{"authors":{"author":[{"@pid":"h/PavolHell","text":"Pavol Hell"},{"@pid":"32/9213","text":"Shenwei Huang"}]},"title":"Complexity of Coloring Graphs without Paths and Cycles.","venue":"CoRR","volume":"abs/1310.0340","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HellH13","ee":"http://arxiv.org/abs/1310.0340","url":"https://dblp.org/rec/journals/corr/HellH13"}, "url":"URL#4254435" }, { "@score":"1", "@id":"4254436", "info":{"authors":{"author":{"@pid":"43/1984","text":"Ziv Hellman"}},"title":"Deludedly Agreeing to Agree.","venue":"CoRR","volume":"abs/1310.6418","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hellman13","ee":"http://arxiv.org/abs/1310.6418","url":"https://dblp.org/rec/journals/corr/Hellman13"}, "url":"URL#4254436" }, { "@score":"1", "@id":"4254441", "info":{"authors":{"author":[{"@pid":"h/EdithHemaspaandra","text":"Edith Hemaspaandra"},{"@pid":"h/LaneAHemaspaandra","text":"Lane A. Hemaspaandra"},{"@pid":"r/JorgRothe","text":"Jörg Rothe"}]},"title":"The Complexity of Online Manipulation of Sequential Elections.","venue":"CoRR","volume":"abs/1310.6997","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HemaspaandraHR13","ee":"http://arxiv.org/abs/1310.6997","url":"https://dblp.org/rec/journals/corr/HemaspaandraHR13"}, "url":"URL#4254441" }, { "@score":"1", "@id":"4254450", "info":{"authors":{"author":{"@pid":"12/1672","text":"Christopher S. Henry"}},"title":"The (Nested) Word Problem.","venue":"CoRR","volume":"abs/1310.6283","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Henry13a","ee":"http://arxiv.org/abs/1310.6283","url":"https://dblp.org/rec/journals/corr/Henry13a"}, "url":"URL#4254450" }, { "@score":"1", "@id":"4254459", "info":{"authors":{"author":[{"@pid":"45/4009","text":"Julio C. Hernandez-Castro"},{"@pid":"136/5723","text":"Jeremy Rossman"}]},"title":"Measuring Software Diversity, with Applications to Security.","venue":"CoRR","volume":"abs/1310.3307","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hernandez-CastroR13","ee":"http://arxiv.org/abs/1310.3307","url":"https://dblp.org/rec/journals/corr/Hernandez-CastroR13"}, "url":"URL#4254459" }, { "@score":"1", "@id":"4254463", "info":{"authors":{"author":[{"@pid":"10/9671","text":"Carlos Herrera-Yagüe"},{"@pid":"47/9225","text":"Christian M. Schneider"},{"@pid":"46/8344","text":"Zbigniew Smoreda"},{"@pid":"34/8344","text":"Thomas Couronné"},{"@pid":"71/1991","text":"Pedro J. Zufiria"},{"@pid":"12/8911","text":"Marta C. González"}]},"title":"The elliptic model for social fluxes.","venue":"CoRR","volume":"abs/1310.0163","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Herrera-YagueSSCZG13","ee":"http://arxiv.org/abs/1310.0163","url":"https://dblp.org/rec/journals/corr/Herrera-YagueSSCZG13"}, "url":"URL#4254463" }, { "@score":"1", "@id":"4254480", "info":{"authors":{"author":[{"@pid":"11/9509","text":"Arend Hintze"},{"@pid":"132/2048","text":"Randal S. Olson"},{"@pid":"36/1930","text":"Christoph Adami"},{"@pid":"71/3174","text":"Ralph Hertwig"}]},"title":"Risk aversion as an evolutionary adaptation.","venue":"CoRR","volume":"abs/1310.6338","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HintzeOAH13","ee":"http://arxiv.org/abs/1310.6338","url":"https://dblp.org/rec/journals/corr/HintzeOAH13"}, "url":"URL#4254480" }, { "@score":"1", "@id":"4254496", "info":{"authors":{"author":[{"@pid":"52/11210","text":"Christelle Hobeika"},{"@pid":"89/549","text":"Claude Thibeault"},{"@pid":"79/10036","text":"Jean-François Boland"}]},"title":"Technical report: Functional Constraint Extraction From Register Transfer Level for ATPG.","venue":"CoRR","volume":"abs/1310.0100","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HobeikaTB13","ee":"http://arxiv.org/abs/1310.0100","url":"https://dblp.org/rec/journals/corr/HobeikaTB13"}, "url":"URL#4254496" }, { "@score":"1", "@id":"4254506", "info":{"authors":{"author":[{"@pid":"34/8773","text":"Piotr Hofman"},{"@pid":"97/3803","text":"Slawomir Lasota 0001"},{"@pid":"81/113","text":"Richard Mayr"},{"@pid":"51/7221","text":"Patrick Totzke"}]},"title":"Simulation Over One-counter Nets is PSPACE-Complete.","venue":"CoRR","volume":"abs/1310.6303","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HofmanLMT13","ee":"http://arxiv.org/abs/1310.6303","url":"https://dblp.org/rec/journals/corr/HofmanLMT13"}, "url":"URL#4254506" }, { "@score":"1", "@id":"4254507", "info":{"authors":{"author":[{"@pid":"h/MartinHofmann","text":"Martin Hofmann 0001"},{"@pid":"10/8280","text":"Ramyaa Ramyaa"}]},"title":"Power of Nondetreministic JAGs on Cayley graphs.","venue":"CoRR","volume":"abs/1310.8317","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HofmannR13","ee":"http://arxiv.org/abs/1310.8317","url":"https://dblp.org/rec/journals/corr/HofmannR13"}, "url":"URL#4254507" }, { "@score":"1", "@id":"4254517", "info":{"authors":{"author":{"@pid":"10/4899","text":"Petter Holme"}},"title":"Extinction times of epidemic outbreaks in networks.","venue":"CoRR","volume":"abs/1310.3932","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Holme13","ee":"http://arxiv.org/abs/1310.3932","url":"https://dblp.org/rec/journals/corr/Holme13"}, "url":"URL#4254517" }, { "@score":"1", "@id":"4254519", "info":{"authors":{"author":[{"@pid":"136/6027","text":"John T. Holodnak"},{"@pid":"29/5833","text":"Ilse C. F. Ipsen"}]},"title":"Randomized Matrix Multiplication: Exact Computation and Probabilistic Bounds.","venue":"CoRR","volume":"abs/1310.1502","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HolodnakI13","ee":"http://arxiv.org/abs/1310.1502","url":"https://dblp.org/rec/journals/corr/HolodnakI13"}, "url":"URL#4254519" }, { "@score":"1", "@id":"4254537", "info":{"authors":{"author":{"@pid":"132/9203","text":"Reza Hooshmand"}},"title":"Secret Key Cryptosystem based on Non-Systematic Polar Codes.","venue":"CoRR","volume":"abs/1310.6485","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hooshmand13","ee":"http://arxiv.org/abs/1310.6485","url":"https://dblp.org/rec/journals/corr/Hooshmand13"}, "url":"URL#4254537" }, { "@score":"1", "@id":"4254550", "info":{"authors":{"author":[{"@pid":"78/10948","text":"Md. Iqbal Hossain 0001"},{"@pid":"r/MdSaidurRahman","text":"Md. Saidur Rahman 0001"}]},"title":"Monotone Grid Drawings of Planar Graphs.","venue":"CoRR","volume":"abs/1310.6084","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hossain013","ee":"http://arxiv.org/abs/1310.6084","url":"https://dblp.org/rec/journals/corr/Hossain013"}, "url":"URL#4254550" }, { "@score":"1", "@id":"4254553", "info":{"authors":{"author":[{"@pid":"78/7661","text":"Ehsan Hosseini"},{"@pid":"37/3474","text":"Erik Perrins"}]},"title":"Timing, Carrier, and Frame Synchronization of Burst-Mode CPM.","venue":"CoRR","volume":"abs/1310.0757","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HosseiniP13a","ee":"http://arxiv.org/abs/1310.0757","url":"https://dblp.org/rec/journals/corr/HosseiniP13a"}, "url":"URL#4254553" }, { "@score":"1", "@id":"4254562", "info":{"authors":{"author":[{"@pid":"136/5856","text":"Vedran Hrgetic"},{"@pid":"70/2284","text":"Tomislav Pribanic"}]},"title":"Surface Registration Using Genetic Algorithm in Reduced Search Space.","venue":"CoRR","volume":"abs/1310.0302","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HrgeticP13","ee":"http://arxiv.org/abs/1310.0302","url":"https://dblp.org/rec/journals/corr/HrgeticP13"}, "url":"URL#4254562" }, { "@score":"1", "@id":"4254573", "info":{"authors":{"author":{"@pid":"51/6123","text":"Yuan Hu"}},"title":"Optimizing Device-to-Device Communications in Cellular Networks.","venue":"CoRR","volume":"abs/1310.5960","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hu13","ee":"http://arxiv.org/abs/1310.5960","url":"https://dblp.org/rec/journals/corr/Hu13"}, "url":"URL#4254573" }, { "@score":"1", "@id":"4254583", "info":{"authors":{"author":[{"@pid":"136/5600","text":"Heliang Huang"},{"@pid":"37/8125","text":"Wansu Bao"}]},"title":"Middle-Solving F4 to Compute Grobner bases for Cryptanalysis over GF(2).","venue":"CoRR","volume":"abs/1310.2332","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangB13","ee":"http://arxiv.org/abs/1310.2332","url":"https://dblp.org/rec/journals/corr/HuangB13"}, "url":"URL#4254583" }, { "@score":"1", "@id":"4254586", "info":{"authors":{"author":[{"@pid":"32/5539","text":"Lirong Huang"},{"@pid":"67/45","text":"Håkan Hjalmarsson"},{"@pid":"21/3075","text":"László Gerencsér"}]},"title":"Adaptive experiment design for LTI systems.","venue":"CoRR","volume":"abs/1310.3973","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangHG13","ee":"http://arxiv.org/abs/1310.3973","url":"https://dblp.org/rec/journals/corr/HuangHG13"}, "url":"URL#4254586" }, { "@score":"1", "@id":"4254593", "info":{"authors":{"author":[{"@pid":"60/5414-1","text":"Xiaowei Huang 0001"},{"@pid":"m/RvdMeyden","text":"Ron van der Meyden"}]},"title":"Symbolic Synthesis of Knowledge-based Program Implementations with Synchronous Semantics.","venue":"CoRR","volume":"abs/1310.6423","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangM13","ee":"http://arxiv.org/abs/1310.6423","url":"https://dblp.org/rec/journals/corr/HuangM13"}, "url":"URL#4254593" }, { "@score":"1", "@id":"4254603", "info":{"authors":{"author":[{"@pid":"01/3367","text":"Sheng-Jun Huang"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"}]},"title":"Fast Multi-Instance Multi-Label Learning.","venue":"CoRR","volume":"abs/1310.2049","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangZ13","ee":"http://arxiv.org/abs/1310.2049","url":"https://dblp.org/rec/journals/corr/HuangZ13"}, "url":"URL#4254603" }, { "@score":"1", "@id":"4254626", "info":{"authors":{"author":[{"@pid":"63/9687","text":"Martin Huschenbett"},{"@pid":"79/477","text":"Manfred Kufleitner"}]},"title":"Ehrenfeucht-Fraisse Games on Omega-Terms.","venue":"CoRR","volume":"abs/1310.3195","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuschenbettK13","ee":"http://arxiv.org/abs/1310.3195","url":"https://dblp.org/rec/journals/corr/HuschenbettK13"}, "url":"URL#4254626" }, { "@score":"1", "@id":"4254632", "info":{"authors":{"author":[{"@pid":"89/5383","text":"Frank Hutter"},{"@pid":"h/HolgerHHoos","text":"Holger H. Hoos"},{"@pid":"81/1149","text":"Kevin Leyton-Brown"}]},"title":"Bayesian Optimization With Censored Response Data.","venue":"CoRR","volume":"abs/1310.1947","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HutterHL13","ee":"http://arxiv.org/abs/1310.1947","url":"https://dblp.org/rec/journals/corr/HutterHL13"}, "url":"URL#4254632" }, { "@score":"1", "@id":"4254634", "info":{"authors":{"author":[{"@pid":"89/5383","text":"Frank Hutter"},{"@pid":"59/6403","text":"Michael A. Osborne"}]},"title":"A Kernel for Hierarchical Parameter Spaces.","venue":"CoRR","volume":"abs/1310.5738","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/HutterO13","ee":"http://arxiv.org/abs/1310.5738","url":"https://dblp.org/rec/journals/corr/HutterO13"}, "url":"URL#4254634" }, { "@score":"1", "@id":"4254641", "info":{"authors":{"author":[{"@pid":"136/5866","text":"Dmytro Iatsenko"},{"@pid":"118/7179","text":"Peter V. E. McClintock"},{"@pid":"01/8736","text":"Aneta Stefanovska"}]},"title":"On the extraction of instantaneous frequencies from ridges in time-frequency representations of signals.","venue":"CoRR","volume":"abs/1310.7276","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IatsenkoMS13","ee":"http://arxiv.org/abs/1310.7276","url":"https://dblp.org/rec/journals/corr/IatsenkoMS13"}, "url":"URL#4254641" }, { "@score":"1", "@id":"4254642", "info":{"authors":{"author":[{"@pid":"136/5866","text":"Dmytro Iatsenko"},{"@pid":"118/7179","text":"Peter V. E. McClintock"},{"@pid":"01/8736","text":"Aneta Stefanovska"}]},"title":"Linear and synchrosqueezed time-frequency representations revisited. Part I: Overview, standards of use, related issues and algorithms.","venue":"CoRR","volume":"abs/1310.7215","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IatsenkoMS13a","ee":"http://arxiv.org/abs/1310.7215","url":"https://dblp.org/rec/journals/corr/IatsenkoMS13a"}, "url":"URL#4254642" }, { "@score":"1", "@id":"4254643", "info":{"authors":{"author":[{"@pid":"136/5866","text":"Dmytro Iatsenko"},{"@pid":"118/7179","text":"Peter V. E. McClintock"},{"@pid":"01/8736","text":"Aneta Stefanovska"}]},"title":"Linear and synchrosqueezed time-frequency representations revisited. Part II: Resolution, reconstruction and concentration.","venue":"CoRR","volume":"abs/1310.7274","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IatsenkoMS13b","ee":"http://arxiv.org/abs/1310.7274","url":"https://dblp.org/rec/journals/corr/IatsenkoMS13b"}, "url":"URL#4254643" }, { "@score":"1", "@id":"4254656", "info":{"authors":{"author":[{"@pid":"44/7113","text":"Velimir M. Ilic"},{"@pid":"66/2098","text":"Miomir S. Stankovic"}]},"title":"A unified characterization of generalized information and certainty measures.","venue":"CoRR","volume":"abs/1310.4896","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IlicS13","ee":"http://arxiv.org/abs/1310.4896","url":"https://dblp.org/rec/journals/corr/IlicS13"}, "url":"URL#4254656" }, { "@score":"1", "@id":"4254660", "info":{"authors":{"author":[{"@pid":"90/9283","text":"Muhammad Ilyas"},{"@pid":"76/3932","text":"Mieko Yamada"}]},"title":"Generalized Extended Hamming Codes over Galois Ring of Characteristic $2{n}$.","venue":"CoRR","volume":"abs/1310.5225","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IlyasY13","ee":"http://arxiv.org/abs/1310.5225","url":"https://dblp.org/rec/journals/corr/IlyasY13"}, "url":"URL#4254660" }, { "@score":"1", "@id":"4254664", "info":{"authors":{"author":[{"@pid":"78/5250-2","text":"Muhammad Imran 0002"},{"@pid":"27/5065","text":"Ioanna Lykourentzou"},{"@pid":"c/CarlosCastillo1","text":"Carlos Castillo 0001"}]},"title":"Engineering Crowdsourced Stream Processing Systems.","venue":"CoRR","volume":"abs/1310.5463","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ImranLC13","ee":"http://arxiv.org/abs/1310.5463","url":"https://dblp.org/rec/journals/corr/ImranLC13"}, "url":"URL#4254664" }, { "@score":"1", "@id":"4254685", "info":{"authors":{"author":{"@pid":"136/6062","text":"Mohammad Shahidul Islam"}},"title":"Gender Classification Using Gradient Direction Pattern.","venue":"CoRR","volume":"abs/1310.6808","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Islam13","ee":"http://arxiv.org/abs/1310.6808","url":"https://dblp.org/rec/journals/corr/Islam13"}, "url":"URL#4254685" }, { "@score":"1", "@id":"4254689", "info":{"authors":{"author":{"@pid":"116/2924","text":"Ayad Ghany Ismaeel"}},"title":"New Approach for Prediction Pre-cancer via Detecting Mutated in Tumor Protein P53.","venue":"CoRR","volume":"abs/1310.2182","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ismaeel13","ee":"http://arxiv.org/abs/1310.2182","url":"https://dblp.org/rec/journals/corr/Ismaeel13"}, "url":"URL#4254689" }, { "@score":"1", "@id":"4254691", "info":{"authors":{"author":[{"@pid":"136/5784","text":"Pankaj Kumar Israni"},{"@pid":"29/8675","text":"S. C. Jain"}]},"title":"Digital Circuits Implementation On Rpga Simulator.","venue":"CoRR","volume":"abs/1310.5411","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/IsraniJ13","ee":"http://arxiv.org/abs/1310.5411","url":"https://dblp.org/rec/journals/corr/IsraniJ13"}, "url":"URL#4254691" }, { "@score":"1", "@id":"4254718", "info":{"authors":{"author":{"@pid":"34/8169","text":"Aubrey Jaffer"}},"title":"Easy Accurate Reading and Writing of Floating-Point Numbers.","venue":"CoRR","volume":"abs/1310.8121","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jaffer13","ee":"http://arxiv.org/abs/1310.8121","url":"https://dblp.org/rec/journals/corr/Jaffer13"}, "url":"URL#4254718" }, { "@score":"1", "@id":"4254724", "info":{"authors":{"author":[{"@pid":"123/4705","text":"Dhanamma Jagli"},{"@pid":"136/6150","text":"Priyanka Gaikwad"},{"@pid":"136/5776","text":"Shubhangi Gunjal"},{"@pid":"136/5616","text":"Chaitanya Bilaware"}]},"title":"Handy Annotations within Oracle 10g.","venue":"CoRR","volume":"abs/1310.2367","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JagliGGB13","ee":"http://arxiv.org/abs/1310.2367","url":"https://dblp.org/rec/journals/corr/JagliGGB13"}, "url":"URL#4254724" }, { "@score":"1", "@id":"4254725", "info":{"authors":{"author":[{"@pid":"123/4705","text":"Dhanamma Jagli"},{"@pid":"136/5757","text":"Sangeeta Oswal"}]},"title":"Web Usage Mining: Pattern Discovery and Forecasting.","venue":"CoRR","volume":"abs/1310.2375","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JagliO13","ee":"http://arxiv.org/abs/1310.2375","url":"https://dblp.org/rec/journals/corr/JagliO13"}, "url":"URL#4254725" }, { "@score":"1", "@id":"4254726", "info":{"authors":{"author":[{"@pid":"123/4705","text":"Dhanamma Jagli"},{"@pid":"136/6022","text":"Ramesh Solanki"},{"@pid":"136/5679","text":"Rohini Temkar"},{"@pid":"136/5931","text":"Laxmi Veshapogu"}]},"title":"Semi Symmetric Method Of SAN Storage Virtualization.","venue":"CoRR","volume":"abs/1310.2369","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JagliSTV13","ee":"http://arxiv.org/abs/1310.2369","url":"https://dblp.org/rec/journals/corr/JagliSTV13"}, "url":"URL#4254726" }, { "@score":"1", "@id":"4254727", "info":{"authors":{"author":[{"@pid":"123/4705","text":"Dhanamma Jagli"},{"@pid":"136/5679","text":"Rohini Temkar"}]},"title":"The Unified Approach For Organizational Network Vulnerability Assessment.","venue":"CoRR","volume":"abs/1310.2365","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JagliT13","ee":"http://arxiv.org/abs/1310.2365","url":"https://dblp.org/rec/journals/corr/JagliT13"}, "url":"URL#4254727" }, { "@score":"1", "@id":"4254728", "info":{"authors":{"author":[{"@pid":"42/10403","text":"Sudhir B. Jagtap"},{"@pid":"04/9363","text":"B. G. Kodge"}]},"title":"Census Data Mining and Data Analysis using WEKA.","venue":"CoRR","volume":"abs/1310.4647","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JagtapG13","ee":"http://arxiv.org/abs/1310.4647","url":"https://dblp.org/rec/journals/corr/JagtapG13"}, "url":"URL#4254728" }, { "@score":"1", "@id":"4254760", "info":{"authors":{"author":[{"@pid":"56/2424","text":"Mikolás Janota"},{"@pid":"12/1369","text":"Radu Grigore"},{"@pid":"340/6684-1","text":"João Marques-Silva 0001"}]},"title":"On QBF Proofs and Preprocessing.","venue":"CoRR","volume":"abs/1310.2491","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JanotaGM13","ee":"http://arxiv.org/abs/1310.2491","url":"https://dblp.org/rec/journals/corr/JanotaGM13"}, "url":"URL#4254760" }, { "@score":"1", "@id":"4254764", "info":{"authors":{"author":[{"@pid":"77/6011","text":"Svante Janson"},{"@pid":"60/1574","text":"Gregory B. Sorkin"}]},"title":"VCG Auction Mechanism Cost Expectations and Variances.","venue":"CoRR","volume":"abs/1310.1777","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JansonS13","ee":"http://arxiv.org/abs/1310.1777","url":"https://dblp.org/rec/journals/corr/JansonS13"}, "url":"URL#4254764" }, { "@score":"1", "@id":"4254771", "info":{"authors":{"author":[{"@pid":"116/7077","text":"Andrzej Jarynowski"},{"@pid":"20/9670","text":"Andrzej Buda"}]},"title":"Dynamics of popstar record sales on phonographic market - stochastic model.","venue":"CoRR","volume":"abs/1310.8185","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JarynowskiB13","ee":"http://arxiv.org/abs/1310.8185","url":"https://dblp.org/rec/journals/corr/JarynowskiB13"}, "url":"URL#4254771" }, { "@score":"1", "@id":"4254772", "info":{"authors":{"author":[{"@pid":"116/7077","text":"Andrzej Jarynowski"},{"@pid":"136/5880","text":"Amir Rostami"}]},"title":"Reading Stockholm Riots 2013 in social media by text-mining.","venue":"CoRR","volume":"abs/1310.1249","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JarynowskiR13","ee":"http://arxiv.org/abs/1310.1249","url":"https://dblp.org/rec/journals/corr/JarynowskiR13"}, "url":"URL#4254772" }, { "@score":"1", "@id":"4254779", "info":{"authors":{"author":[{"@pid":"136/6088","text":"Rafel Jaume"},{"@pid":"r/GunterRote","text":"Günter Rote"}]},"title":"The finest regular coarsening and recursively-regular subdivisions.","venue":"CoRR","volume":"abs/1310.4372","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JaumeR13","ee":"http://arxiv.org/abs/1310.4372","url":"https://dblp.org/rec/journals/corr/JaumeR13"}, "url":"URL#4254779" }, { "@score":"1", "@id":"4254787", "info":{"authors":{"author":{"@pid":"14/10963","text":"Marco Alberto Javarone"}},"title":"Competitive dynamics of lexical innovations in multi-layer networks.","venue":"CoRR","volume":"abs/1310.4975","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Javarone13","ee":"http://arxiv.org/abs/1310.4975","url":"https://dblp.org/rec/journals/corr/Javarone13"}, "url":"URL#4254787" }, { "@score":"1", "@id":"4254790", "info":{"authors":{"author":[{"@pid":"63/5509","text":"Prem Prakash Jayaraman"},{"@pid":"115/6940","text":"Charith Perera"},{"@pid":"82/2760","text":"Dimitrios Georgakopoulos 0001"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"}]},"title":"Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.","venue":"CoRR","volume":"abs/1310.4052","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JayaramanPGZ13","ee":"http://arxiv.org/abs/1310.4052","url":"https://dblp.org/rec/journals/corr/JayaramanPGZ13"}, "url":"URL#4254790" }, { "@score":"1", "@id":"4254797", "info":{"authors":{"author":[{"@pid":"22/1509","text":"Sang-Woon Jeon"},{"@pid":"12/6741","text":"Chien-Yi Wang"},{"@pid":"40/709","text":"Michael Gastpar"}]},"title":"Computation Over Gaussian Networks With Orthogonal Components.","venue":"CoRR","volume":"abs/1310.7112","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JeonWG13","ee":"http://arxiv.org/abs/1310.7112","url":"https://dblp.org/rec/journals/corr/JeonWG13"}, "url":"URL#4254797" }, { "@score":"1", "@id":"4254803", "info":{"authors":{"author":[{"@pid":"j/MarkJerrum","text":"Mark Jerrum"},{"@pid":"25/9061","text":"Kitty Meeks"}]},"title":"Some hard classes of parameterised counting problems.","venue":"CoRR","volume":"abs/1310.6524","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JerrumM13a","ee":"http://arxiv.org/abs/1310.6524","url":"https://dblp.org/rec/journals/corr/JerrumM13a"}, "url":"URL#4254803" }, { "@score":"1", "@id":"4254804", "info":{"authors":{"author":{"@pid":"74/6087","text":"Artur Jez"}},"title":"Context unification is in PSPACE.","venue":"CoRR","volume":"abs/1310.4367","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jez13","ee":"http://arxiv.org/abs/1310.4367","url":"https://dblp.org/rec/journals/corr/Jez13"}, "url":"URL#4254804" }, { "@score":"1", "@id":"4254808", "info":{"authors":{"author":[{"@pid":"11/8383","text":"Madhav Jha"},{"@pid":"60/4210","text":"C. Seshadhri 0001"},{"@pid":"40/3478","text":"Ali Pinar"}]},"title":"When a Graph is not so Simple: Counting Triangles in Multigraph Streams.","venue":"CoRR","volume":"abs/1310.7665","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JhaSP13","ee":"http://arxiv.org/abs/1310.7665","url":"https://dblp.org/rec/journals/corr/JhaSP13"}, "url":"URL#4254808" }, { "@score":"1", "@id":"4254809", "info":{"authors":{"author":[{"@pid":"136/6066","text":"Rohit Jha"},{"@pid":"136/6038","text":"Alfy Samuel"},{"@pid":"136/5688","text":"Ashmee Pawar"},{"@pid":"136/5973","text":"M. Kiruthika"}]},"title":"A Domain-Specific Language for Discrete Mathematics.","venue":"CoRR","volume":"abs/1310.3473","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JhaSPK13","ee":"http://arxiv.org/abs/1310.3473","url":"https://dblp.org/rec/journals/corr/JhaSPK13"}, "url":"URL#4254809" }, { "@score":"1", "@id":"4254811", "info":{"authors":{"author":{"@pid":"30/2575","text":"Zhengfeng Ji"}},"title":"Binary Constraint System Games and Locally Commutative Reductions.","venue":"CoRR","volume":"abs/1310.3794","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ji13","ee":"http://arxiv.org/abs/1310.3794","url":"https://dblp.org/rec/journals/corr/Ji13"}, "url":"URL#4254811" }, { "@score":"1", "@id":"4254813", "info":{"authors":{"author":[{"@pid":"136/5645","text":"Kaihua Ji"},{"@pid":"12/8228","text":"Jiawei Liu"},{"@pid":"70/6206","text":"Gang Xiang"}]},"title":"Anti-rumor dynamics and rumor control strategies on complex network.","venue":"CoRR","volume":"abs/1310.7198","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiLX13","ee":"http://arxiv.org/abs/1310.7198","url":"https://dblp.org/rec/journals/corr/JiLX13"}, "url":"URL#4254813" }, { "@score":"1", "@id":"4254823", "info":{"authors":{"author":[{"@pid":"86/7131","text":"Luo-Luo Jiang"},{"@pid":"79/5040","text":"Matjaz Perc"}]},"title":"Spreading of cooperative behaviour across interdependent groups.","venue":"CoRR","volume":"abs/1310.4166","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangP13","ee":"http://arxiv.org/abs/1310.4166","url":"https://dblp.org/rec/journals/corr/JiangP13"}, "url":"URL#4254823" }, { "@score":"1", "@id":"4254827", "info":{"authors":{"author":[{"@pid":"75/1693","text":"Feng Jiang"},{"@pid":"63/10337","text":"Jiemin Wang"},{"@pid":"76/2009","text":"Abram Hindle"},{"@pid":"n/MarioANascimento","text":"Mario A. Nascimento"}]},"title":"Mining the Temporal Evolution of the Android Bug Reporting Community via Sliding Windows.","venue":"CoRR","volume":"abs/1310.7469","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangWHN13","ee":"http://arxiv.org/abs/1310.7469","url":"https://dblp.org/rec/journals/corr/JiangWHN13"}, "url":"URL#4254827" }, { "@score":"1", "@id":"4254840", "info":{"authors":{"author":[{"@pid":"77/10517","text":"Boram Jin"},{"@pid":"23/8862","text":"Se-Young Yun"},{"@pid":"199/8703","text":"Daewoo Kim"},{"@pid":"31/7062","text":"Jinwoo Shin"},{"@pid":"01/66","text":"Yung Yi"},{"@pid":"99/1909","text":"Seongik Hong"},{"@pid":"42/6008","text":"Byoung-Joon Lee"}]},"title":"On the Delay Scaling Laws of Cache Networks.","venue":"CoRR","volume":"abs/1310.0572","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JinYKSYHL13","ee":"http://arxiv.org/abs/1310.0572","url":"https://dblp.org/rec/journals/corr/JinYKSYHL13"}, "url":"URL#4254840" }, { "@score":"1", "@id":"4254845", "info":{"authors":{"author":{"@pid":"58/1342-1","text":"Fredrik Johansson 0001"}},"title":"Evaluating parametric holonomic sequences using rectangular splitting.","venue":"CoRR","volume":"abs/1310.3741","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Johansson13a","ee":"http://arxiv.org/abs/1310.3741","url":"https://dblp.org/rec/journals/corr/Johansson13a"}, "url":"URL#4254845" }, { "@score":"1", "@id":"4254849", "info":{"authors":{"author":{"@pid":"17/5192","text":"Oliver Johnson"}},"title":"A de Bruijn identity for symmetric stable laws.","venue":"CoRR","volume":"abs/1310.2045","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Johnson13a","ee":"http://arxiv.org/abs/1310.2045","url":"https://dblp.org/rec/journals/corr/Johnson13a"}, "url":"URL#4254849" }, { "@score":"1", "@id":"4254855", "info":{"authors":{"author":[{"@pid":"125/2098","text":"Austin Jones"},{"@pid":"22/7012","text":"Mac Schwager"},{"@pid":"86/3295","text":"Calin Belta"}]},"title":"Technical Report: Distribution Temporal Logic: Combining Correctness with Quality of Estimation.","venue":"CoRR","volume":"abs/1310.7950","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JonesSB13","ee":"http://arxiv.org/abs/1310.7950","url":"https://dblp.org/rec/journals/corr/JonesSB13"}, "url":"URL#4254855" }, { "@score":"1", "@id":"4254871", "info":{"authors":{"author":[{"@pid":"20/5153","text":"Reyes Juárez-Ramírez"},{"@pid":"136/5791","text":"Karen Cortés Verdín"},{"@pid":"136/6111","text":"Beatriz Angélica Toscano de la Torre"},{"@pid":"30/5714","text":"Hanna Oktaba"},{"@pid":"24/3964","text":"Carlos Alberto Fernández y Fernández"},{"@pid":"88/2103","text":"Brenda Leticia Flores Ríos"},{"@pid":"136/5922","text":"Fabiola Angulo Molina"}]},"title":"Estado Actual de la Práctica de la Ingeniería de Software en México.","venue":"CoRR","volume":"abs/1310.6686","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Juarez-RamirezVTOFRM13","ee":"http://arxiv.org/abs/1310.6686","url":"https://dblp.org/rec/journals/corr/Juarez-RamirezVTOFRM13"}, "url":"URL#4254871" }, { "@score":"1", "@id":"4254874", "info":{"authors":{"author":[{"@pid":"40/10919","text":"Hyun Joon Jung"},{"@pid":"29/239","text":"Matthew Lease"}]},"title":"Crowdsourced Task Routing via Matrix Factorization.","venue":"CoRR","volume":"abs/1310.5142","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JungL13a","ee":"http://arxiv.org/abs/1310.5142","url":"https://dblp.org/rec/journals/corr/JungL13a"}, "url":"URL#4254874" }, { "@score":"1", "@id":"4254879", "info":{"authors":{"author":[{"@pid":"74/441","text":"Tomasz Jurdzinski"},{"@pid":"43/6109","text":"Dariusz R. Kowalski"},{"@pid":"56/6707","text":"Krzysztof Lorys"}]},"title":"Online Packet Scheduling under Adversarial Jamming.","venue":"CoRR","volume":"abs/1310.4935","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/JurdzinskiKL13","ee":"http://arxiv.org/abs/1310.4935","url":"https://dblp.org/rec/journals/corr/JurdzinskiKL13"}, "url":"URL#4254879" }, { "@score":"1", "@id":"4254886", "info":{"authors":{"author":[{"@pid":"23/6451","text":"Alexander Kadyrov"},{"@pid":"26/6190-1","text":"Hui Yu 0001"},{"@pid":"10/4601","text":"Honghai Liu 0001"}]},"title":"Ship Detection and Segmentation using Image Correlation.","venue":"CoRR","volume":"abs/1310.5542","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KadyrovYL13","ee":"http://arxiv.org/abs/1310.5542","url":"https://dblp.org/rec/journals/corr/KadyrovYL13"}, "url":"URL#4254886" }, { "@score":"1", "@id":"4254908", "info":{"authors":{"author":{"@pid":"47/717","text":"Subhash C. Kak"}},"title":"Threshold Quantum Cryptography.","venue":"CoRR","volume":"abs/1310.6333","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kak13b","ee":"http://arxiv.org/abs/1310.6333","url":"https://dblp.org/rec/journals/corr/Kak13b"}, "url":"URL#4254908" }, { "@score":"1", "@id":"4254920", "info":{"authors":{"author":[{"@pid":"30/5217","text":"Cezary Kaliszyk"},{"@pid":"63/5214","text":"Josef Urban"}]},"title":"Lemma Mining over HOL Light.","venue":"CoRR","volume":"abs/1310.2797","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaliszykU13a","ee":"http://arxiv.org/abs/1310.2797","url":"https://dblp.org/rec/journals/corr/KaliszykU13a"}, "url":"URL#4254920" }, { "@score":"1", "@id":"4254921", "info":{"authors":{"author":[{"@pid":"30/5217","text":"Cezary Kaliszyk"},{"@pid":"63/5214","text":"Josef Urban"}]},"title":"MizAR 40 for Mizar 40.","venue":"CoRR","volume":"abs/1310.2805","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaliszykU13b","ee":"http://arxiv.org/abs/1310.2805","url":"https://dblp.org/rec/journals/corr/KaliszykU13b"}, "url":"URL#4254921" }, { "@score":"1", "@id":"4254932", "info":{"authors":{"author":[{"@pid":"07/11048","text":"Rushikesh Kamalapurkar"},{"@pid":"131/6650","text":"Justin Klotz"},{"@pid":"51/208","text":"Warren E. Dixon"}]},"title":"Concurrent learning-based online approximate feedback-Nash equilibrium solution of N-player nonzero-sum differential games.","venue":"CoRR","volume":"abs/1310.1384","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KamalapurkarKD13","ee":"http://arxiv.org/abs/1310.1384","url":"https://dblp.org/rec/journals/corr/KamalapurkarKD13"}, "url":"URL#4254932" }, { "@score":"1", "@id":"4254938", "info":{"authors":{"author":[{"@pid":"136/5740","text":"Tal Kaminker"},{"@pid":"s/MichaSharir","text":"Micha Sharir"}]},"title":"Finding the Largest Disk Containing a Query Point in Logarithmic Time with Linear Storage.","venue":"CoRR","volume":"abs/1310.3388","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaminkerS13","ee":"http://arxiv.org/abs/1310.3388","url":"https://dblp.org/rec/journals/corr/KaminkerS13"}, "url":"URL#4254938" }, { "@score":"1", "@id":"4254942", "info":{"authors":{"author":[{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"117/5417-1","text":"Axel Müller 0001"},{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Linear Precoding Based on Truncated Polynomial Expansion - Part II: Large-Scale Multi-Cell Systems.","venue":"CoRR","volume":"abs/1310.1799","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KammounMBD13","ee":"http://arxiv.org/abs/1310.1799","url":"https://dblp.org/rec/journals/corr/KammounMBD13"}, "url":"URL#4254942" }, { "@score":"1", "@id":"4254948", "info":{"authors":{"author":[{"@pid":"134/4725","text":"Jeffrey Kane"},{"@pid":"84/281","text":"Pavel Naumov"}]},"title":"Epistemic Logic for Communication Chains.","venue":"CoRR","volume":"abs/1310.6424","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaneN13","ee":"http://arxiv.org/abs/1310.6424","url":"https://dblp.org/rec/journals/corr/KaneN13"}, "url":"URL#4254948" }, { "@score":"1", "@id":"4254949", "info":{"authors":{"author":{"@pid":"136/5751","text":"Lucas Kang"}},"title":"Investigation of Rule 73 as Case Study of Class 4 Long-Distance Cellular Automata.","venue":"CoRR","volume":"abs/1310.3311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kang13","ee":"http://arxiv.org/abs/1310.3311","url":"https://dblp.org/rec/journals/corr/Kang13"}, "url":"URL#4254949" }, { "@score":"1", "@id":"4254973", "info":{"authors":{"author":[{"@pid":"77/7137","text":"Iasson Karafyllis"},{"@pid":"55/286","text":"Michael Malisoff"},{"@pid":"44/625","text":"Marcio S. de Queiroz"},{"@pid":"35/775","text":"Miroslav Krstic"}]},"title":"Predictor-Based Tracking For Neuromuscular Electrical Stimulation.","venue":"CoRR","volume":"abs/1310.1857","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarafyllisMQK13","ee":"http://arxiv.org/abs/1310.1857","url":"https://dblp.org/rec/journals/corr/KarafyllisMQK13"}, "url":"URL#4254973" }, { "@score":"1", "@id":"4254976", "info":{"authors":{"author":[{"@pid":"91/8774","text":"Nikos Karampatziakis"},{"@pid":"35/5613","text":"Paul Mineiro"}]},"title":"Discriminative Features via Generalized Eigenvectors.","venue":"CoRR","volume":"abs/1310.1934","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarampatziakisM13","ee":"http://arxiv.org/abs/1310.1934","url":"https://dblp.org/rec/journals/corr/KarampatziakisM13"}, "url":"URL#4254976" }, { "@score":"1", "@id":"4254977", "info":{"authors":{"author":[{"@pid":"91/8774","text":"Nikos Karampatziakis"},{"@pid":"35/5613","text":"Paul Mineiro"}]},"title":"Combining Structured and Unstructured Randomness in Large Scale PCA.","venue":"CoRR","volume":"abs/1310.6304","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarampatziakisM13a","ee":"http://arxiv.org/abs/1310.6304","url":"https://dblp.org/rec/journals/corr/KarampatziakisM13a"}, "url":"URL#4254977" }, { "@score":"1", "@id":"4254979", "info":{"authors":{"author":[{"@pid":"44/10260","text":"Prateek Karandikar"},{"@pid":"s/PhSchnoebelen","text":"Philippe Schnoebelen"}]},"title":"On the index of Simon's congruence for piecewise testability.","venue":"CoRR","volume":"abs/1310.1278","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarandikarS13","ee":"http://arxiv.org/abs/1310.1278","url":"https://dblp.org/rec/journals/corr/KarandikarS13"}, "url":"URL#4254979" }, { "@score":"1", "@id":"4254991", "info":{"authors":{"author":[{"@pid":"78/4591","text":"Kamel Karoui"},{"@pid":"36/3714","text":"Fakher Ben Ftima"},{"@pid":"256/3919","text":"Henda Hajjami Ben Ghézala"}]},"title":"Distributed firewalls and IDS interoperability checking based on a formal approach.","venue":"CoRR","volume":"abs/1310.2861","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarouiFG13","ee":"http://arxiv.org/abs/1310.2861","url":"https://dblp.org/rec/journals/corr/KarouiFG13"}, "url":"URL#4254991" }, { "@score":"1", "@id":"4255003", "info":{"authors":{"author":[{"@pid":"130/5771","text":"Dharshana Kasthurirathna"},{"@pid":"20/200","text":"Andy Dong"},{"@pid":"m/PiraveenanMahendra","text":"Mahendra Piraveenan"},{"@pid":"61/4131","text":"Irem Y. Tumer"}]},"title":"The failure tolerance of mechatronic software systems to random and targeted attacks.","venue":"CoRR","volume":"abs/1310.1050","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KasthurirathnaDPT13","ee":"http://arxiv.org/abs/1310.1050","url":"https://dblp.org/rec/journals/corr/KasthurirathnaDPT13"}, "url":"URL#4255003" }, { "@score":"1", "@id":"4255018", "info":{"authors":{"author":[{"@pid":"136/5785","text":"Sukhdilpreet Kaur"},{"@pid":"98/10122","text":"Amandeep Verma"}]},"title":"Design of Generic Framework for Botnet Detection in Network Forensics.","venue":"CoRR","volume":"abs/1310.0569","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaurV13","ee":"http://arxiv.org/abs/1310.0569","url":"https://dblp.org/rec/journals/corr/KaurV13"}, "url":"URL#4255018" }, { "@score":"1", "@id":"4255022", "info":{"authors":{"author":[{"@pid":"72/5724","text":"Hiroyuki Kawai"},{"@pid":"135/6227","text":"Matthew J. Bellman"},{"@pid":"38/10642","text":"Ryan Downey"},{"@pid":"51/208","text":"Warren E. Dixon"}]},"title":"Tracking Control for FES-Cycling based on Force Direction Efficiency with Antagonistic Bi-Articular Muscles.","venue":"CoRR","volume":"abs/1310.0296","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KawaiBDD13","ee":"http://arxiv.org/abs/1310.0296","url":"https://dblp.org/rec/journals/corr/KawaiBDD13"}, "url":"URL#4255022" }, { "@score":"1", "@id":"4255026", "info":{"authors":{"author":[{"@pid":"04/9461","text":"Md. Imrul Kayes"},{"@pid":"136/5941","text":"Mithun Sarker"},{"@pid":"29/2042","text":"Jacob Chakareski"}]},"title":"On Measuring Test Quality in Scrum: An Empirical Study.","venue":"CoRR","volume":"abs/1310.2545","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KayesSC13","ee":"http://arxiv.org/abs/1310.2545","url":"https://dblp.org/rec/journals/corr/KayesSC13"}, "url":"URL#4255026" }, { "@score":"1", "@id":"4255029", "info":{"authors":{"author":[{"@pid":"68/6770","text":"Michael M. Kazhdan"},{"@pid":"b/RandalCBurns","text":"Randal C. Burns"},{"@pid":"136/5930","text":"Bobby Kasthuri"},{"@pid":"70/6445","text":"Jeff Lichtman"},{"@pid":"29/5640","text":"R. Jacob Vogelstein"},{"@pid":"04/700","text":"Joshua T. Vogelstein"}]},"title":"Gradient-Domain Processing for Large EM Image Stacks.","venue":"CoRR","volume":"abs/1310.0041","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KazhdanBKLVV13","ee":"http://arxiv.org/abs/1310.0041","url":"https://dblp.org/rec/journals/corr/KazhdanBKLVV13"}, "url":"URL#4255029" }, { "@score":"1", "@id":"4255042", "info":{"authors":{"author":[{"@pid":"03/6755","text":"Vassilis Kekatos"},{"@pid":"50/671-5","text":"Yu Zhang 0005"},{"@pid":"33/4080","text":"Georgios B. Giannakis"}]},"title":"Electricity Market Forecasting via Low-Rank Multi-Kernel Learning.","venue":"CoRR","volume":"abs/1310.0865","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KekatosZG13","ee":"http://arxiv.org/abs/1310.0865","url":"https://dblp.org/rec/journals/corr/KekatosZG13"}, "url":"URL#4255042" }, { "@score":"1", "@id":"4255048", "info":{"authors":{"author":[{"@pid":"120/3207","text":"Max Kemman"},{"@pid":"270/2018","text":"Stef Scagliola"},{"@pid":"d/FranciskadeJong","text":"Franciska de Jong"},{"@pid":"75/3664","text":"Roeland Ordelman"}]},"title":"Talking With Scholars: Developing a Research Environment for Oral History Collections.","venue":"CoRR","volume":"abs/1310.3370","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KemmanSJO13","ee":"http://arxiv.org/abs/1310.3370","url":"https://dblp.org/rec/journals/corr/KemmanSJO13"}, "url":"URL#4255048" }, { "@score":"1", "@id":"4255049", "info":{"authors":{"author":[{"@pid":"63/5749-1","text":"David Kempe 0001"},{"@pid":"09/6191","text":"Brendan Lucier"}]},"title":"User Satisfaction in Competitive Sponsored Search.","venue":"CoRR","volume":"abs/1310.4098","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KempeL13","ee":"http://arxiv.org/abs/1310.4098","url":"https://dblp.org/rec/journals/corr/KempeL13"}, "url":"URL#4255049" }, { "@score":"1", "@id":"4255060", "info":{"authors":{"author":[{"@pid":"95/8775","text":"Gabriel Kerneis"},{"@pid":"136/5849","text":"Charlie Shepherd"},{"@pid":"136/6169","text":"Stefan Hajnoczi"}]},"title":"QEMU/CPC: static analysis and CPS conversion for safe, portable, and efficient coroutines.","venue":"CoRR","volume":"abs/1310.3404","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KerneisSH13","ee":"http://arxiv.org/abs/1310.3404","url":"https://dblp.org/rec/journals/corr/KerneisSH13"}, "url":"URL#4255060" }, { "@score":"1", "@id":"4255070", "info":{"authors":{"author":{"@pid":"132/8957","text":"Quist-Aphetsi Kester"}},"title":"Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data.","venue":"CoRR","volume":"abs/1310.0864","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kester13g","ee":"http://arxiv.org/abs/1310.0864","url":"https://dblp.org/rec/journals/corr/Kester13g"}, "url":"URL#4255070" }, { "@score":"1", "@id":"4255077", "info":{"authors":{"author":[{"@pid":"156/1372","text":"Mohammad Khafagy"},{"@pid":"79/8332","text":"Amr Ismail"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"},{"@pid":"77/1439","text":"Sonia Aïssa"}]},"title":"Energy-Efficient Cooperative Protocols for Full-Duplex Relay Channels.","venue":"CoRR","volume":"abs/1310.4596","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhafagyIAA13","ee":"http://arxiv.org/abs/1310.4596","url":"https://dblp.org/rec/journals/corr/KhafagyIAA13"}, "url":"URL#4255077" }, { "@score":"1", "@id":"4255084", "info":{"authors":{"author":{"@pid":"64/10202-2","text":"Muhammad Imran Khan 0002"}},"title":"Network Parameters Impact on Dynamic Transmission Power Control in Vehicular Ad hoc Networks.","venue":"CoRR","volume":"abs/1310.4475","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Khan13","ee":"http://arxiv.org/abs/1310.4475","url":"https://dblp.org/rec/journals/corr/Khan13"}, "url":"URL#4255084" }, { "@score":"1", "@id":"4255095", "info":{"authors":{"author":[{"@pid":"117/3654","text":"Adnan Alam Khan"},{"@pid":"01/3386","text":"Safeeullah Soomro"},{"@pid":"135/6153","text":"Abdul Ghafoor Memon"}]},"title":"Flickers Forecasting In CRT Using Stochastic Analysis.","venue":"CoRR","volume":"abs/1310.5478","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanSM13","ee":"http://arxiv.org/abs/1310.5478","url":"https://dblp.org/rec/journals/corr/KhanSM13"}, "url":"URL#4255095" }, { "@score":"1", "@id":"4255105", "info":{"authors":{"author":[{"@pid":"132/9358","text":"Seyyed Reza Khaze"},{"@pid":"132/9118","text":"Isa Maleki"},{"@pid":"135/6004","text":"Sohrab Hojjatkhah"},{"@pid":"136/5745","text":"Ali Bagherinia"}]},"title":"Evaluation the efficiency of artificial bee colony and the firefly algorithm in solving the continuous optimization problem.","venue":"CoRR","volume":"abs/1310.7961","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhazeMHB13","ee":"http://arxiv.org/abs/1310.7961","url":"https://dblp.org/rec/journals/corr/KhazeMHB13"}, "url":"URL#4255105" }, { "@score":"1", "@id":"4255106", "info":{"authors":{"author":[{"@pid":"136/5763","text":"Anagha P. Khedkar"},{"@pid":"56/9454","text":"Shaila Subbaraman"}]},"title":"The Novel Approach of Adaptive Twin Probability for Genetic Algorithm.","venue":"CoRR","volume":"abs/1310.1227","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhedkarS13","ee":"http://arxiv.org/abs/1310.1227","url":"https://dblp.org/rec/journals/corr/KhedkarS13"}, "url":"URL#4255106" }, { "@score":"1", "@id":"4255115", "info":{"authors":{"author":{"@pid":"27/4680","text":"Kamal Khuri-Makdisi"}},"title":"On Jacobian group arithmetic for typical divisors on curves.","venue":"CoRR","volume":"abs/1310.6324","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Khuri-Makdisi13","ee":"http://arxiv.org/abs/1310.6324","url":"https://dblp.org/rec/journals/corr/Khuri-Makdisi13"}, "url":"URL#4255115" }, { "@score":"1", "@id":"4255116", "info":{"authors":{"author":[{"@pid":"136/6155","text":"Foruzan Kiamarzpour"},{"@pid":"49/7628","text":"Rouhollah Dianat"},{"@pid":"75/4002","text":"Mohammad Bahrani"},{"@pid":"53/10608","text":"Mehdi Sadeghzadeh"}]},"title":"Improving the methods of email classification based on words ontology.","venue":"CoRR","volume":"abs/1310.5963","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KiamarzpourDBS13","ee":"http://arxiv.org/abs/1310.5963","url":"https://dblp.org/rec/journals/corr/KiamarzpourDBS13"}, "url":"URL#4255116" }, { "@score":"1", "@id":"4255137", "info":{"authors":{"author":[{"@pid":"82/9528","text":"Juhoon Kim"},{"@pid":"90/4201","text":"Ramin Khalili"},{"@pid":"f/AnjaFeldmann","text":"Anja Feldmann"},{"@pid":"83/2711","text":"Yung-Chih Chen"},{"@pid":"t/DonaldFTowsley","text":"Don Towsley"}]},"title":"Multi-Source Multi-Path HTTP (mHTTP): A Proposal.","venue":"CoRR","volume":"abs/1310.2748","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimKFCT13","ee":"http://arxiv.org/abs/1310.2748","url":"https://dblp.org/rec/journals/corr/KimKFCT13"}, "url":"URL#4255137" }, { "@score":"1", "@id":"4255141", "info":{"authors":{"author":[{"@pid":"30/10801","text":"Donggun Kim"},{"@pid":"17/6798","text":"Youngchul Sung"},{"@pid":"10/4783","text":"Jihoon Chung"}]},"title":"Filter-And-Forward Relay Design for MIMO-OFDM Systems.","venue":"CoRR","volume":"abs/1310.3015","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimSC13","ee":"http://arxiv.org/abs/1310.3015","url":"https://dblp.org/rec/journals/corr/KimSC13"}, "url":"URL#4255141" }, { "@score":"1", "@id":"4255143", "info":{"authors":{"author":[{"@pid":"57/7954","text":"Jinsub Kim"},{"@pid":"92/1653","text":"Lang Tong"},{"@pid":"12/1240","text":"Robert J. Thomas"}]},"title":"Data Framing Attack on State Estimation.","venue":"CoRR","volume":"abs/1310.7616","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimTT13","ee":"http://arxiv.org/abs/1310.7616","url":"https://dblp.org/rec/journals/corr/KimTT13"}, "url":"URL#4255143" }, { "@score":"1", "@id":"4255151", "info":{"authors":{"author":[{"@pid":"125/2049","text":"Clemens Kirisits"},{"@pid":"125/2104","text":"Lukas F. Lang"},{"@pid":"38/5361","text":"Otmar Scherzer"}]},"title":"Optical Flow on Evolving Surfaces with Space and Time Regularisation.","venue":"CoRR","volume":"abs/1310.0322","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KirisitsLS13","ee":"http://arxiv.org/abs/1310.0322","url":"https://dblp.org/rec/journals/corr/KirisitsLS13"}, "url":"URL#4255151" }, { "@score":"1", "@id":"4255167", "info":{"authors":{"author":[{"@pid":"12/1449","text":"Ines Klimann"},{"@pid":"87/1132","text":"Jean Mairesse"},{"@pid":"00/5897","text":"Matthieu Picantin"}]},"title":"Implementing Computations in Automaton (Semi)groups.","venue":"CoRR","volume":"abs/1310.4856","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KlimannMP13","ee":"http://arxiv.org/abs/1310.4856","url":"https://dblp.org/rec/journals/corr/KlimannMP13"}, "url":"URL#4255167" }, { "@score":"1", "@id":"4255168", "info":{"authors":{"author":[{"@pid":"12/1449","text":"Ines Klimann"},{"@pid":"00/5897","text":"Matthieu Picantin"}]},"title":"A characterization of those automata that structurally generate finite groups.","venue":"CoRR","volume":"abs/1310.7137","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KlimannP13","ee":"http://arxiv.org/abs/1310.7137","url":"https://dblp.org/rec/journals/corr/KlimannP13"}, "url":"URL#4255168" }, { "@score":"1", "@id":"4255176", "info":{"authors":{"author":[{"@pid":"116/2776","text":"Vadym Kliuchnikov"},{"@pid":"40/11190","text":"Alex Bocharov"},{"@pid":"s/KMSvore","text":"Krysta M. Svore"}]},"title":"Asymptotically Optimal Topological Quantum Compiling.","venue":"CoRR","volume":"abs/1310.4150","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KliuchnikovBS13","ee":"http://arxiv.org/abs/1310.4150","url":"https://dblp.org/rec/journals/corr/KliuchnikovBS13"}, "url":"URL#4255176" }, { "@score":"1", "@id":"4255179", "info":{"authors":{"author":[{"@pid":"136/6013","text":"Kyle Kloster"},{"@pid":"40/4457","text":"David F. Gleich"}]},"title":"A Fast Relaxation Method for Computing a Column of the Matrix Exponential of Stochastic Matrices from Large, Sparse Networks.","venue":"CoRR","volume":"abs/1310.3423","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KlosterG13","ee":"http://arxiv.org/abs/1310.3423","url":"https://dblp.org/rec/journals/corr/KlosterG13"}, "url":"URL#4255179" }, { "@score":"1", "@id":"4255211", "info":{"authors":{"author":[{"@pid":"06/51","text":"Pascal Koiran"},{"@pid":"33/6120","text":"Natacha Portier"},{"@pid":"38/11466","text":"Sébastien Tavenas"}]},"title":"On the intersection of a sparse curve and a low-degree curve: A polynomial version of the lost theorem.","venue":"CoRR","volume":"abs/1310.2447","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoiranPT13","ee":"http://arxiv.org/abs/1310.2447","url":"https://dblp.org/rec/journals/corr/KoiranPT13"}, "url":"URL#4255211" }, { "@score":"1", "@id":"4255216", "info":{"authors":{"author":[{"@pid":"74/7853","text":"Vasil Kolev"},{"@pid":"119/8759","text":"Katya Tsvetkova"},{"@pid":"22/8262","text":"Milcho Tsvetkov"}]},"title":"Singular Value Decomposition of Images from Scanned Photographic Plates.","venue":"CoRR","volume":"abs/1310.1869","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolevTT13","ee":"http://arxiv.org/abs/1310.1869","url":"https://dblp.org/rec/journals/corr/KolevTT13"}, "url":"URL#4255216" }, { "@score":"1", "@id":"4255218", "info":{"authors":{"author":[{"@pid":"126/5116","text":"Günther Koliander"},{"@pid":"18/6668","text":"Erwin Riegler"},{"@pid":"12/3405","text":"Giuseppe Durisi"},{"@pid":"h/FranzHlawatsch","text":"Franz Hlawatsch"}]},"title":"Degrees of Freedom of Generic Block-Fading MIMO Channels without A Priori Channel State Information.","venue":"CoRR","volume":"abs/1310.2490","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolianderRDH13a","ee":"http://arxiv.org/abs/1310.2490","url":"https://dblp.org/rec/journals/corr/KolianderRDH13a"}, "url":"URL#4255218" }, { "@score":"1", "@id":"4255232", "info":{"authors":{"author":[{"@pid":"31/2518","text":"Arun Siddharth Konagurthu"},{"@pid":"124/1116","text":"James H. Collier"}]},"title":"An information measure for comparing top $k$ lists.","venue":"CoRR","volume":"abs/1310.0110","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KonagurthuC13","ee":"http://arxiv.org/abs/1310.0110","url":"https://dblp.org/rec/journals/corr/KonagurthuC13"}, "url":"URL#4255232" }, { "@score":"1", "@id":"4255242", "info":{"authors":{"author":[{"@pid":"136/5939","text":"Shota Kono"},{"@pid":"136/6160","text":"Daiki Aminaka"},{"@pid":"31/6801","text":"Shoji Makino"},{"@pid":"05/1197","text":"Tomasz M. Rutkowski"}]},"title":"EEG Signal Processing and Classification for the Novel Tactile-Force Brain-Computer Interface Paradigm.","venue":"CoRR","volume":"abs/1310.1593","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KonoAMR13","ee":"http://arxiv.org/abs/1310.1593","url":"https://dblp.org/rec/journals/corr/KonoAMR13"}, "url":"URL#4255242" }, { "@score":"1", "@id":"4255254", "info":{"authors":{"author":[{"@pid":"136/5680","text":"Yosef Kornbluth"},{"@pid":"136/5629","text":"Steven Lowinger"},{"@pid":"136/5604","text":"Gabriel Cwilich"},{"@pid":"40/6319","text":"Sergey V. Buldyrev"}]},"title":"Cascading Failures in Networks with Proximate Dependent Nodes.","venue":"CoRR","volume":"abs/1310.5720","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KornbluthLCB13","ee":"http://arxiv.org/abs/1310.5720","url":"https://dblp.org/rec/journals/corr/KornbluthLCB13"}, "url":"URL#4255254" }, { "@score":"1", "@id":"4255256", "info":{"authors":{"author":[{"@pid":"09/10065","text":"Anja Korporal"},{"@pid":"08/901","text":"Georg Regensburger"}]},"title":"Composing and Factoring Generalized Green's Operators and Ordinary Boundary Problems.","venue":"CoRR","volume":"abs/1310.8455","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KorporalR13","ee":"http://arxiv.org/abs/1310.8455","url":"https://dblp.org/rec/journals/corr/KorporalR13"}, "url":"URL#4255256" }, { "@score":"1", "@id":"4255261", "info":{"authors":{"author":[{"@pid":"k/AdrianKosowski","text":"Adrian Kosowski"},{"@pid":"68/7401","text":"Marcin Markiewicz"}]},"title":"Lower Bounds on the Communication Complexity of Binary Local Quantum Measurement Simulation.","venue":"CoRR","volume":"abs/1310.2217","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KosowskiM13","ee":"http://arxiv.org/abs/1310.2217","url":"https://dblp.org/rec/journals/corr/KosowskiM13"}, "url":"URL#4255261" }, { "@score":"1", "@id":"4255265", "info":{"authors":{"author":{"@pid":"136/5801","text":"Vamsi Sashank Kotagiri"}},"title":"The 10-point and 12-point Number Theoretic Hilbert Transform.","venue":"CoRR","volume":"abs/1310.3221","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kotagiri13","ee":"http://arxiv.org/abs/1310.3221","url":"https://dblp.org/rec/journals/corr/Kotagiri13"}, "url":"URL#4255265" }, { "@score":"1", "@id":"4255266", "info":{"authors":{"author":{"@pid":"136/5801","text":"Vamsi Sashank Kotagiri"}},"title":"New Results on the Number Theoretic Hilbert Transform.","venue":"CoRR","volume":"abs/1310.6924","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kotagiri13a","ee":"http://arxiv.org/abs/1310.6924","url":"https://dblp.org/rec/journals/corr/Kotagiri13a"}, "url":"URL#4255266" }, { "@score":"1", "@id":"4255272", "info":{"authors":{"author":[{"@pid":"136/6005","text":"Hadi Razzaghi Kouchaksaraei"},{"@pid":"44/7435","text":"Alexander G. Chefranov"}]},"title":"Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing.","venue":"CoRR","volume":"abs/1310.0441","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KouchaksaraeiC13","ee":"http://arxiv.org/abs/1310.0441","url":"https://dblp.org/rec/journals/corr/KouchaksaraeiC13"}, "url":"URL#4255272" }, { "@score":"1", "@id":"4255274", "info":{"authors":{"author":[{"@pid":"03/8134","text":"Christos K. Kourtellaris"},{"@pid":"25/6012","text":"Charalambos D. Charalambous"},{"@pid":"33/8135","text":"Photios A. Stavrou"}]},"title":"General Source-Channel Matching for Sources with Memory.","venue":"CoRR","volume":"abs/1310.3085","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KourtellarisCS13","ee":"http://arxiv.org/abs/1310.3085","url":"https://dblp.org/rec/journals/corr/KourtellarisCS13"}, "url":"URL#4255274" }, { "@score":"1", "@id":"4255279", "info":{"authors":{"author":[{"@pid":"136/5845","text":"Kristian Kovacic"},{"@pid":"59/5036","text":"Edouard Ivanjko"},{"@pid":"64/4680","text":"Hrvoje Gold"}]},"title":"Computer Vision Systems in Road Vehicles: A Review.","venue":"CoRR","volume":"abs/1310.0315","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KovacicIG13","ee":"http://arxiv.org/abs/1310.0315","url":"https://dblp.org/rec/journals/corr/KovacicIG13"}, "url":"URL#4255279" }, { "@score":"1", "@id":"4255290", "info":{"authors":{"author":{"@pid":"27/2225","text":"Jakub Kozik"}},"title":"Multipass greedy coloring of simple uniform hypergraphs.","venue":"CoRR","volume":"abs/1310.5984","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kozik13","ee":"http://arxiv.org/abs/1310.5984","url":"https://dblp.org/rec/journals/corr/Kozik13"}, "url":"URL#4255290" }, { "@score":"1", "@id":"4255302", "info":{"authors":{"author":[{"@pid":"136/5718","text":"Ivan Kreso"},{"@pid":"94/10230","text":"Marko Sevrovic"},{"@pid":"42/3275","text":"Sinisa Segvic"}]},"title":"A Novel Georeferenced Dataset for Stereo Visual Odometry.","venue":"CoRR","volume":"abs/1310.0310","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KresoSS13","ee":"http://arxiv.org/abs/1310.0310","url":"https://dblp.org/rec/journals/corr/KresoSS13"}, "url":"URL#4255302" }, { "@score":"1", "@id":"4255305", "info":{"authors":{"author":{"@pid":"79/5692","text":"Ioannis Krikidis"}},"title":"Simultaneous Information and Energy Transfer in Large-Scale Networks with/without Relaying.","venue":"CoRR","volume":"abs/1310.6511","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krikidis13","ee":"http://arxiv.org/abs/1310.6511","url":"https://dblp.org/rec/journals/corr/Krikidis13"}, "url":"URL#4255305" }, { "@score":"1", "@id":"4255309", "info":{"authors":{"author":{"@pid":"07/10549","text":"Aravindh Krishnamoorthy"}},"title":"Linear Extended Whitening Filters.","venue":"CoRR","volume":"abs/1310.3454","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krishnamoorthy13a","ee":"http://arxiv.org/abs/1310.3454","url":"https://dblp.org/rec/journals/corr/Krishnamoorthy13a"}, "url":"URL#4255309" }, { "@score":"1", "@id":"4255310", "info":{"authors":{"author":[{"@pid":"91/7323","text":"Mukkai Krishnamoorthy"},{"@pid":"98/8298","text":"Wesley Miller"},{"@pid":"136/5731","text":"Raju Krishnamoorthy"}]},"title":"Evolution of choices over time: The U.S. Presidential election 2012 and the NY City Mayoral Election, 2013.","venue":"CoRR","volume":"abs/1310.1118","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnamoorthyMK13","ee":"http://arxiv.org/abs/1310.1118","url":"https://dblp.org/rec/journals/corr/KrishnamoorthyMK13"}, "url":"URL#4255310" }, { "@score":"1", "@id":"4255312", "info":{"authors":{"author":[{"@pid":"57/4126","text":"Rajet Krishnan"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"c/GiulioColavolpe","text":"Giulio Colavolpe"}]},"title":"Constellation Optimization in the Presence of Strong Phase Noise.","venue":"CoRR","volume":"abs/1310.1635","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnanAEC13","ee":"http://arxiv.org/abs/1310.1635","url":"https://dblp.org/rec/journals/corr/KrishnanAEC13"}, "url":"URL#4255312" }, { "@score":"1", "@id":"4255315", "info":{"authors":{"author":[{"@pid":"57/4126","text":"Rajet Krishnan"},{"@pid":"121/8887","text":"Mohammad Reza Khanzadi"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"68/2707","text":"Tommy Svensson"}]},"title":"Soft metrics and their Performance Analysis for Optimal Data Detection in the Presence of Strong Oscillator Phase Noise.","venue":"CoRR","volume":"abs/1310.1638","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnanKES13","ee":"http://arxiv.org/abs/1310.1638","url":"https://dblp.org/rec/journals/corr/KrishnanKES13"}, "url":"URL#4255315" }, { "@score":"1", "@id":"4255316", "info":{"authors":{"author":[{"@pid":"136/6109","text":"Vishaal Krishnan"},{"@pid":"83/8071","text":"Arun D. Mahindrakar"}]},"title":"Synchronization and semistability analysis of the Kuramoto model of coupled nonlinear oscillators.","venue":"CoRR","volume":"abs/1310.0598","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnanM13","ee":"http://arxiv.org/abs/1310.0598","url":"https://dblp.org/rec/journals/corr/KrishnanM13"}, "url":"URL#4255316" }, { "@score":"1", "@id":"4255326", "info":{"authors":{"author":[{"@pid":"04/8297","text":"Filip Kruzel"},{"@pid":"17/6547","text":"Krzysztof Banas"}]},"title":"Vectorized OpenCL implementation of numerical integration for higher order finite elements.","venue":"CoRR","volume":"abs/1310.1194","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KruzelB13","ee":"http://arxiv.org/abs/1310.1194","url":"https://dblp.org/rec/journals/corr/KruzelB13"}, "url":"URL#4255326" }, { "@score":"1", "@id":"4255329", "info":{"authors":{"author":[{"@pid":"k/GregoryKucherov","text":"Gregory Kucherov"},{"@pid":"04/5238","text":"Dekel Tsur"}]},"title":"Approximate String Matching using a Bidirectional Index.","venue":"CoRR","volume":"abs/1310.1440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KucherovT13","ee":"http://arxiv.org/abs/1310.1440","url":"https://dblp.org/rec/journals/corr/KucherovT13"}, "url":"URL#4255329" }, { "@score":"1", "@id":"4255334", "info":{"authors":{"author":[{"@pid":"79/477","text":"Manfred Kufleitner"},{"@pid":"78/908","text":"Tobias Walter"}]},"title":"One Quantifier Alternation in First-Order Logic with Modular Predicates.","venue":"CoRR","volume":"abs/1310.5043","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KufleitnerW13","ee":"http://arxiv.org/abs/1310.5043","url":"https://dblp.org/rec/journals/corr/KufleitnerW13"}, "url":"URL#4255334" }, { "@score":"1", "@id":"4255339", "info":{"authors":{"author":[{"@pid":"41/9672","text":"Jan Kuipers"},{"@pid":"77/8432","text":"Takahiro Ueda"},{"@pid":"34/3620","text":"J. A. M. Vermaseren"}]},"title":"Code Optimization in FORM.","venue":"CoRR","volume":"abs/1310.7007","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KuipersUV13","ee":"http://arxiv.org/abs/1310.7007","url":"https://dblp.org/rec/journals/corr/KuipersUV13"}, "url":"URL#4255339" }, { "@score":"1", "@id":"4255346", "info":{"authors":{"author":{"@pid":"23/1836","text":"Oliver Kullmann"}},"title":"Hardness measures and resolution lower bounds.","venue":"CoRR","volume":"abs/1310.7627","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kullmann13","ee":"http://arxiv.org/abs/1310.7627","url":"https://dblp.org/rec/journals/corr/Kullmann13"}, "url":"URL#4255346" }, { "@score":"1", "@id":"4255353", "info":{"authors":{"author":[{"@pid":"34/5378","text":"Ashish Kumar"},{"@pid":"181/2477-2","text":"Anupam Gupta 0002"}]},"title":"Some Efficient Solutions to Yao's Millionaire Problem.","venue":"CoRR","volume":"abs/1310.8063","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarG13","ee":"http://arxiv.org/abs/1310.8063","url":"https://dblp.org/rec/journals/corr/KumarG13"}, "url":"URL#4255353" }, { "@score":"1", "@id":"4255356", "info":{"authors":{"author":[{"@pid":"136/6053","text":"T. Ravi Kumar"},{"@pid":"135/6042","text":"R. V. Krishnaiah"}]},"title":"Optical Disk with Blu-Ray Technology.","venue":"CoRR","volume":"abs/1310.1551","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarK13","ee":"http://arxiv.org/abs/1310.1551","url":"https://dblp.org/rec/journals/corr/KumarK13"}, "url":"URL#4255356" }, { "@score":"1", "@id":"4255371", "info":{"authors":{"author":[{"@pid":"19/2279","text":"Vinay Kumar"},{"@pid":"136/6154","text":"Reema Thareja"}]},"title":"A Simplified Approach for Quality Management in Data Warehouse.","venue":"CoRR","volume":"abs/1310.2066","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarT13","ee":"http://arxiv.org/abs/1310.2066","url":"https://dblp.org/rec/journals/corr/KumarT13"}, "url":"URL#4255371" }, { "@score":"1", "@id":"4255376", "info":{"authors":{"author":[{"@pid":"127/6541","text":"Atreyee Kundu"},{"@pid":"01/7143","text":"Debasish Chatterjee"}]},"title":"Stabilizing discrete-time switched linear systems.","venue":"CoRR","volume":"abs/1310.3595","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KunduC13","ee":"http://arxiv.org/abs/1310.3595","url":"https://dblp.org/rec/journals/corr/KunduC13"}, "url":"URL#4255376" }, { "@score":"1", "@id":"4255377", "info":{"authors":{"author":[{"@pid":"136/5708","text":"Ankit Kundu"},{"@pid":"136/5760","text":"Pradosh K. Roy"}]},"title":"Sparse Signal Recovery from Nonadaptive Linear Measurements.","venue":"CoRR","volume":"abs/1310.8468","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KunduR13","ee":"http://arxiv.org/abs/1310.8468","url":"https://dblp.org/rec/journals/corr/KunduR13"}, "url":"URL#4255377" }, { "@score":"1", "@id":"4255396", "info":{"authors":{"author":[{"@pid":"k/AlexanderKurz","text":"Alexander Kurz 0001"},{"@pid":"66/6078-1","text":"Tomoyuki Suzuki 0001"},{"@pid":"10/5529","text":"Emilio Tuosto"}]},"title":"Nominal Regular Expressions for Languages over Infinite Alphabets. Extended Abstract.","venue":"CoRR","volume":"abs/1310.7093","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kurz0T13","ee":"http://arxiv.org/abs/1310.7093","url":"https://dblp.org/rec/journals/corr/Kurz0T13"}, "url":"URL#4255396" }, { "@score":"1", "@id":"4255398", "info":{"authors":{"author":[{"@pid":"13/2736","text":"Gitta Kutyniok"},{"@pid":"41/1335","text":"Kasso A. Okoudjou"},{"@pid":"24/11268","text":"Friedrich Philipp"}]},"title":"Scalable Frames and Convex Geometry.","venue":"CoRR","volume":"abs/1310.8107","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/KutyniokOP13","ee":"http://arxiv.org/abs/1310.8107","url":"https://dblp.org/rec/journals/corr/KutyniokOP13"}, "url":"URL#4255398" }, { "@score":"1", "@id":"4255399", "info":{"authors":{"author":{"@pid":"26/285","text":"Antti Kuusisto"}},"title":"A Double Team Semantics for Generalized Quantifiers.","venue":"CoRR","volume":"abs/1310.3032","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kuusisto13","ee":"http://arxiv.org/abs/1310.3032","url":"https://dblp.org/rec/journals/corr/Kuusisto13"}, "url":"URL#4255399" }, { "@score":"1", "@id":"4255400", "info":{"authors":{"author":{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"}},"title":"Simple CHT: A New Derivation of the Weakest Failure Detector for Consensus.","venue":"CoRR","volume":"abs/1310.1761","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kuznetsov13","ee":"http://arxiv.org/abs/1310.1761","url":"https://dblp.org/rec/journals/corr/Kuznetsov13"}, "url":"URL#4255400" }, { "@score":"1", "@id":"4255420", "info":{"authors":{"author":[{"@pid":"l/JeffreyCLagarias","text":"Jeffrey C. Lagarias"},{"@pid":"136/5778","text":"Yusheng Luo"}]},"title":"Moser's Shadow Problem.","venue":"CoRR","volume":"abs/1310.4345","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LagariasL13","ee":"http://arxiv.org/abs/1310.4345","url":"https://dblp.org/rec/journals/corr/LagariasL13"}, "url":"URL#4255420" }, { "@score":"1", "@id":"4255421", "info":{"authors":{"author":{"@pid":"129/5638","text":"Victor Lagerkvist"}},"title":"Weak Bases of Boolean Co-Clones.","venue":"CoRR","volume":"abs/1310.3674","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lagerkvist13","ee":"http://arxiv.org/abs/1310.3674","url":"https://dblp.org/rec/journals/corr/Lagerkvist13"}, "url":"URL#4255421" }, { "@score":"1", "@id":"4255422", "info":{"authors":{"author":[{"@pid":"44/3105","text":"Ugo Dal Lago"},{"@pid":"136/5847","text":"Giulio Pellitta"}]},"title":"Complexity Analysis in Presence of Control Operators and Higher-Order Functions (Long Version).","venue":"CoRR","volume":"abs/1310.1763","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LagoP13","ee":"http://arxiv.org/abs/1310.1763","url":"https://dblp.org/rec/journals/corr/LagoP13"}, "url":"URL#4255422" }, { "@score":"1", "@id":"4255427", "info":{"authors":{"author":{"@pid":"09/7536","text":"Shibamouli Lahiri"}},"title":"Complexity of Word Collocation Networks: A Preliminary Structural Analysis.","venue":"CoRR","volume":"abs/1310.5111","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lahiri13","ee":"http://arxiv.org/abs/1310.5111","url":"https://dblp.org/rec/journals/corr/Lahiri13"}, "url":"URL#4255427" }, { "@score":"1", "@id":"4255429", "info":{"authors":{"author":[{"@pid":"68/4448","text":"Bibudh Lahiri"},{"@pid":"136/5821","text":"Arko Provo Mukherjee"},{"@pid":"40/3710","text":"Srikanta Tirthapura"}]},"title":"Identifying Correlated Heavy-Hitters in a Two-Dimensional Data Stream.","venue":"CoRR","volume":"abs/1310.1161","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LahiriMT13","ee":"http://arxiv.org/abs/1310.1161","url":"https://dblp.org/rec/journals/corr/LahiriMT13"}, "url":"URL#4255429" }, { "@score":"1", "@id":"4255433", "info":{"authors":{"author":[{"@pid":"26/10800","text":"Ka Chun Lam"},{"@pid":"77/1959","text":"Lok Ming Lui"}]},"title":"Landmark and Intensity Based Registration with Large Deformations via Quasi-conformal Maps.","venue":"CoRR","volume":"abs/1310.1710","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LamL13","ee":"http://arxiv.org/abs/1310.1710","url":"https://dblp.org/rec/journals/corr/LamL13"}, "url":"URL#4255433" }, { "@score":"1", "@id":"4255434", "info":{"authors":{"author":[{"@pid":"99/8205","text":"Albert Y. S. Lam"},{"@pid":"95/39","text":"Yiu-Wing Leung"},{"@pid":"24/2536","text":"Xiaowen Chu 0001"}]},"title":"Electric Vehicle Charging Station Placement: Formulation, Complexity, and Solutions.","venue":"CoRR","volume":"abs/1310.6925","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LamLC13","ee":"http://arxiv.org/abs/1310.6925","url":"https://dblp.org/rec/journals/corr/LamLC13"}, "url":"URL#4255434" }, { "@score":"1", "@id":"4255437", "info":{"authors":{"author":{"@pid":"98/6670","text":"Rodrigo C. de Lamare"}},"title":"Massive MIMO Systems: Signal Processing Challenges and Research Trends.","venue":"CoRR","volume":"abs/1310.7282","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lamare13a","ee":"http://arxiv.org/abs/1310.7282","url":"https://dblp.org/rec/journals/corr/Lamare13a"}, "url":"URL#4255437" }, { "@score":"1", "@id":"4255453", "info":{"authors":{"author":[{"@pid":"129/7642","text":"Lukas T. N. Landau"},{"@pid":"98/6670","text":"Rodrigo C. de Lamare"},{"@pid":"89/2324","text":"Martin Haardt"}]},"title":"Robust Adaptive Beamforming Algorithms Based on the Constrained Constant Modulus Criterion.","venue":"CoRR","volume":"abs/1310.0101","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LandauLH13","ee":"http://arxiv.org/abs/1310.0101","url":"https://dblp.org/rec/journals/corr/LandauLH13"}, "url":"URL#4255453" }, { "@score":"1", "@id":"4255455", "info":{"authors":{"author":[{"@pid":"118/7191","text":"Nikolas Landia"},{"@pid":"48/9538","text":"Stephan Doerfel"},{"@pid":"26/274","text":"Robert Jäschke"},{"@pid":"a/SarabjotSAnand","text":"Sarabjot Singh Anand"},{"@pid":"h/AndreasHotho","text":"Andreas Hotho"},{"@pid":"68/2220","text":"Nathan Griffiths"}]},"title":"Deeper Into the Folksonomy Graph: FolkRank Adaptations and Extensions for Improved Tag Recommendations.","venue":"CoRR","volume":"abs/1310.1498","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LandiaDJAHG13","ee":"http://arxiv.org/abs/1310.1498","url":"https://dblp.org/rec/journals/corr/LandiaDJAHG13"}, "url":"URL#4255455" }, { "@score":"1", "@id":"4255458", "info":{"authors":{"author":[{"@pid":"55/5701","text":"Jérôme Lang"},{"@pid":"67/2283","text":"Bruno Zanuttini"}]},"title":"Knowledge-Based Programs as Plans: Succinctness and the Complexity of Plan Existence.","venue":"CoRR","volume":"abs/1310.6429","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LangZ13","ee":"http://arxiv.org/abs/1310.6429","url":"https://dblp.org/rec/journals/corr/LangZ13"}, "url":"URL#4255458" }, { "@score":"1", "@id":"4255470", "info":{"authors":{"author":[{"@pid":"86/10715","text":"Michal Lason"},{"@pid":"49/1309","text":"Piotr Micek"},{"@pid":"119/4893","text":"Arkadiusz Pawlik"},{"@pid":"89/8668","text":"Bartosz Walczak"}]},"title":"Coloring intersection graphs of arc-connected sets in the plane.","venue":"CoRR","volume":"abs/1310.7558","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LasonMPW13","ee":"http://arxiv.org/abs/1310.7558","url":"https://dblp.org/rec/journals/corr/LasonMPW13"}, "url":"URL#4255470" }, { "@score":"1", "@id":"4255478", "info":{"authors":{"author":{"@pid":"61/3205","text":"Massimo Lauria"}},"title":"Short $\\mathsf{Res}*(\\mathsf{polylog})$ refutations if and only if narrow $\\mathsf{Res}$ refutations.","venue":"CoRR","volume":"abs/1310.5714","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lauria13","ee":"http://arxiv.org/abs/1310.5714","url":"https://dblp.org/rec/journals/corr/Lauria13"}, "url":"URL#4255478" }, { "@score":"1", "@id":"4255483", "info":{"authors":{"author":{"@pid":"l/RankoLazic","text":"Ranko Lazic 0001"}},"title":"The reachability problem for vector addition systems with a stack is not elementary.","venue":"CoRR","volume":"abs/1310.1767","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lazic13","ee":"http://arxiv.org/abs/1310.1767","url":"https://dblp.org/rec/journals/corr/Lazic13"}, "url":"URL#4255483" }, { "@score":"1", "@id":"4255485", "info":{"authors":{"author":[{"@pid":"42/1996","text":"Amor Lazzez"},{"@pid":"33/3291","text":"Ouissem Ben Fredj"},{"@pid":"36/386","text":"Thabet Slimani"}]},"title":"IAX-Based Peer-to-Peer VoIP Architecture.","venue":"CoRR","volume":"abs/1310.5805","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LazzezFS13","ee":"http://arxiv.org/abs/1310.5805","url":"https://dblp.org/rec/journals/corr/LazzezFS13"}, "url":"URL#4255485" }, { "@score":"1", "@id":"4255491", "info":{"authors":{"author":[{"@pid":"18/2407","text":"Gottfried Lechner"},{"@pid":"87/1780","text":"Christoph Pacher"}]},"title":"Estimating Channel Parameters from the Syndrome of a Linear Code.","venue":"CoRR","volume":"abs/1310.6427","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LechnerP13","ee":"http://arxiv.org/abs/1310.6427","url":"https://dblp.org/rec/journals/corr/LechnerP13"}, "url":"URL#4255491" }, { "@score":"1", "@id":"4255495", "info":{"authors":{"author":[{"@pid":"58/6214","text":"Sang Hoon Lee"},{"@pid":"58/6857","text":"Mihai Cucuringu"},{"@pid":"01/2405","text":"Mason A. Porter"}]},"title":"Density-Based and Transport-Based Core-Periphery Structures in Networks.","venue":"CoRR","volume":"abs/1310.8387","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeCP13","ee":"http://arxiv.org/abs/1310.8387","url":"https://dblp.org/rec/journals/corr/LeeCP13"}, "url":"URL#4255495" }, { "@score":"1", "@id":"4255496", "info":{"authors":{"author":[{"@pid":"58/6214","text":"Sang Hoon Lee"},{"@pid":"136/6058","text":"Robyn Ffrancon"},{"@pid":"21/3006","text":"Daniel M. Abrams"},{"@pid":"47/4593","text":"Beom Jun Kim"},{"@pid":"01/2405","text":"Mason A. Porter"}]},"title":"Matchmaker, matchmaker, make me a match: migration of populations via marriages in the past.","venue":"CoRR","volume":"abs/1310.7532","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeFAKP13","ee":"http://arxiv.org/abs/1310.7532","url":"https://dblp.org/rec/journals/corr/LeeFAKP13"}, "url":"URL#4255496" }, { "@score":"1", "@id":"4255501", "info":{"authors":{"author":[{"@pid":"136/5959","text":"Wijik Lee"},{"@pid":"90/10942","text":"Ji-Youp Kim"},{"@pid":"01/5544","text":"Jong-Seon No"}]},"title":"New Families of $p$-ary Sequences of Period $\\frac{pn-1}{2}$ With Low Maximum Correlation Magnitude.","venue":"CoRR","volume":"abs/1310.2686","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeKN13","ee":"http://arxiv.org/abs/1310.2686","url":"https://dblp.org/rec/journals/corr/LeeKN13"}, "url":"URL#4255501" }, { "@score":"1", "@id":"4255502", "info":{"authors":{"author":[{"@pid":"23/3257","text":"Heunchul Lee"},{"@pid":"95/1937","text":"Taeyoon Kim"},{"@pid":"93/10828","text":"Wonwoo Park"},{"@pid":"136/5734","text":"Jonghan Lim"}]},"title":"Link Performance Abstraction for Interference-Aware Communications (IAC).","venue":"CoRR","volume":"abs/1310.0872","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeKPL13","ee":"http://arxiv.org/abs/1310.0872","url":"https://dblp.org/rec/journals/corr/LeeKPL13"}, "url":"URL#4255502" }, { "@score":"1", "@id":"4255503", "info":{"authors":{"author":[{"@pid":"43/2117-2","text":"Cheng-Wei Lee 0002"},{"@pid":"l/HsuehILu","text":"Hsueh-I Lu"}]},"title":"Replacement Paths via Row Minima of Concise Matrices.","venue":"CoRR","volume":"abs/1310.8062","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeL13","ee":"http://arxiv.org/abs/1310.8062","url":"https://dblp.org/rec/journals/corr/LeeL13"}, "url":"URL#4255503" }, { "@score":"1", "@id":"4255514", "info":{"authors":{"author":[{"@pid":"52/579","text":"Axel Legay"},{"@pid":"26/5698","text":"Sean Sedwards"}]},"title":"Lightweight Monte Carlo Algorithm for Markov Decision Processes.","venue":"CoRR","volume":"abs/1310.3609","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LegayS13","ee":"http://arxiv.org/abs/1310.3609","url":"https://dblp.org/rec/journals/corr/LegayS13"}, "url":"URL#4255514" }, { "@score":"1", "@id":"4255531", "info":{"authors":{"author":{"@pid":"136/5622","text":"Martin Leslie"}},"title":"Hypermap-Homology Quantum Codes (Ph.D. thesis).","venue":"CoRR","volume":"abs/1310.5376","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Leslie13","ee":"http://arxiv.org/abs/1310.5376","url":"https://dblp.org/rec/journals/corr/Leslie13"}, "url":"URL#4255531" }, { "@score":"1", "@id":"4255534", "info":{"authors":{"author":{"@pid":"130/5168","text":"Shoham Letzter"}},"title":"The Property of Having a $k$-Regular Subgraph Has a Sharp Threshold.","venue":"CoRR","volume":"abs/1310.5141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Letzter13","ee":"http://arxiv.org/abs/1310.5141","url":"https://dblp.org/rec/journals/corr/Letzter13"}, "url":"URL#4255534" }, { "@score":"1", "@id":"4255547", "info":{"authors":{"author":[{"@pid":"18/5038","text":"Loet Leydesdorff"},{"@pid":"64/2427","text":"Félix de Moya Anegón"},{"@pid":"83/3581","text":"Vicente P. Guerrero-Bote"}]},"title":"Journal Maps, Interactive Overlays, and the Measurement of Interdisciplinarity on the Basis of Scopus Data (1996-2012).","venue":"CoRR","volume":"abs/1310.4966","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeydesdorffAB13","ee":"http://arxiv.org/abs/1310.4966","url":"https://dblp.org/rec/journals/corr/LeydesdorffAB13"}, "url":"URL#4255547" }, { "@score":"1", "@id":"4255549", "info":{"authors":{"author":[{"@pid":"18/5038","text":"Loet Leydesdorff"},{"@pid":"136/6107","text":"Evgeniy Perevodchikov"},{"@pid":"136/5947","text":"Alexander Uvarov"}]},"title":"Measuring Triple-Helix Synergy in the Russian Innovation Systems at Regional, Provincial and National Levels.","venue":"CoRR","volume":"abs/1310.3040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeydesdorffPU13","ee":"http://arxiv.org/abs/1310.3040","url":"https://dblp.org/rec/journals/corr/LeydesdorffPU13"}, "url":"URL#4255549" }, { "@score":"1", "@id":"4255555", "info":{"authors":{"author":{"@pid":"l/LihongLi","text":"Lihong Li 0001"}},"title":"Generalized Thompson Sampling for Contextual Bandits.","venue":"CoRR","volume":"abs/1310.7163","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Li13e","ee":"http://arxiv.org/abs/1310.7163","url":"https://dblp.org/rec/journals/corr/Li13e"}, "url":"URL#4255555" }, { "@score":"1", "@id":"4255571", "info":{"authors":{"author":[{"@pid":"48/8805","text":"Zhuchun Li"},{"@pid":"58/9701","text":"Seung-Yeal Ha"}]},"title":"Cucker-Smale flocking with alternating leaders.","venue":"CoRR","volume":"abs/1310.3875","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiH13","ee":"http://arxiv.org/abs/1310.3875","url":"https://dblp.org/rec/journals/corr/LiH13"}, "url":"URL#4255571" }, { "@score":"1", "@id":"4255578", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"125/2032","text":"Jiankou Li"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"}]},"title":"Community Structures Are Definable in Networks, and Universal in Real World.","venue":"CoRR","volume":"abs/1310.8294","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLP13","ee":"http://arxiv.org/abs/1310.8294","url":"https://dblp.org/rec/journals/corr/LiLP13"}, "url":"URL#4255578" }, { "@score":"1", "@id":"4255579", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"125/2032","text":"Jiankou Li"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"}]},"title":"Homophyly Networks - A Structural Theory of Networks.","venue":"CoRR","volume":"abs/1310.8295","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLP13a","ee":"http://arxiv.org/abs/1310.8295","url":"https://dblp.org/rec/journals/corr/LiLP13a"}, "url":"URL#4255579" }, { "@score":"1", "@id":"4255580", "info":{"authors":{"author":[{"@pid":"46/2311-1","text":"Xi Li 0001"},{"@pid":"96/13-3","text":"Yao Li 0003"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"77/4964","text":"Anthony R. Dick"},{"@pid":"v/AntonvandenHengel","text":"Anton van den Hengel"}]},"title":"Contextual Hypergraph Modelling for Salient Object Detection.","venue":"CoRR","volume":"abs/1310.5767","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLSDH13","ee":"http://arxiv.org/abs/1310.5767","url":"https://dblp.org/rec/journals/corr/LiLSDH13"}, "url":"URL#4255580" }, { "@score":"1", "@id":"4255584", "info":{"authors":{"author":[{"@pid":"55/6910-1","text":"Ye Li 0001"},{"@pid":"66/8320","text":"Eric S. Missimer"},{"@pid":"w/RichardWest","text":"Richard West"}]},"title":"Predictable Migration and Communication in the Quest-V Multikernel.","venue":"CoRR","volume":"abs/1310.6301","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiMW13","ee":"http://arxiv.org/abs/1310.6301","url":"https://dblp.org/rec/journals/corr/LiMW13"}, "url":"URL#4255584" }, { "@score":"1", "@id":"4255587", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"},{"@pid":"125/2032","text":"Jiankou Li"}]},"title":"Community Structures Are Definable in Networks: A Structural Theory of Networks.","venue":"CoRR","volume":"abs/1310.8038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiPL13","ee":"http://arxiv.org/abs/1310.8038","url":"https://dblp.org/rec/journals/corr/LiPL13"}, "url":"URL#4255587" }, { "@score":"1", "@id":"4255588", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"},{"@pid":"10/4661","text":"Wei Zhang"}]},"title":"Provable Security of Networks.","venue":"CoRR","volume":"abs/1310.8388","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiPZ13","ee":"http://arxiv.org/abs/1310.8388","url":"https://dblp.org/rec/journals/corr/LiPZ13"}, "url":"URL#4255588" }, { "@score":"1", "@id":"4255589", "info":{"authors":{"author":[{"@pid":"136/5759","text":"Feitian Li"},{"@pid":"34/4515","text":"Fei Qiao"},{"@pid":"43/2782-1","text":"Qi Wei 0001"},{"@pid":"94/1128","text":"Huazhong Yang"}]},"title":"A Novel Reconfigurable Computing Architecture for Image Signal Processing Using Circuit-Switched NoC and Synchronous Dataflow Model.","venue":"CoRR","volume":"abs/1310.3356","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiQWY13","ee":"http://arxiv.org/abs/1310.3356","url":"https://dblp.org/rec/journals/corr/LiQWY13"}, "url":"URL#4255589" }, { "@score":"1", "@id":"4255604", "info":{"authors":{"author":[{"@pid":"60/8209","text":"Linjun Li"},{"@pid":"86/2529","text":"Xiangwen Wang"}]},"title":"Growth of scale-free networks under heterogeneous control.","venue":"CoRR","volume":"abs/1310.0547","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiW13a","ee":"http://arxiv.org/abs/1310.0547","url":"https://dblp.org/rec/journals/corr/LiW13a"}, "url":"URL#4255604" }, { "@score":"1", "@id":"4255606", "info":{"authors":{"author":[{"@pid":"55/6910-1","text":"Ye Li 0001"},{"@pid":"w/RichardWest","text":"Richard West"},{"@pid":"66/8320","text":"Eric S. Missimer"}]},"title":"The Quest-V Separation Kernel for Mixed Criticality Systems.","venue":"CoRR","volume":"abs/1310.6298","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiWM13","ee":"http://arxiv.org/abs/1310.6298","url":"https://dblp.org/rec/journals/corr/LiWM13"}, "url":"URL#4255606" }, { "@score":"1", "@id":"4255617", "info":{"authors":{"author":[{"@pid":"119/7676","text":"Muyuan Li"},{"@pid":"22/5702","text":"Haojin Zhu"},{"@pid":"76/9975","text":"Zhaoyu Gao"},{"@pid":"93/5439","text":"Si Chen"},{"@pid":"20/6179-1","text":"Kui Ren 0001"},{"@pid":"23/7122","text":"Le Yu"},{"@pid":"136/6067","text":"Shangqian Hu"}]},"title":"All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking.","venue":"CoRR","volume":"abs/1310.2547","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZGCRYH13","ee":"http://arxiv.org/abs/1310.2547","url":"https://dblp.org/rec/journals/corr/LiZGCRYH13"}, "url":"URL#4255617" }, { "@score":"1", "@id":"4255621", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"10/4661","text":"Wei Zhang"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"}]},"title":"Dimensions, Structures and Security of Networks.","venue":"CoRR","volume":"abs/1310.8293","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZP13","ee":"http://arxiv.org/abs/1310.8293","url":"https://dblp.org/rec/journals/corr/LiZP13"}, "url":"URL#4255621" }, { "@score":"1", "@id":"4255622", "info":{"authors":{"author":[{"@pid":"66/4917","text":"Angsheng Li"},{"@pid":"10/4661","text":"Wei Zhang"},{"@pid":"14/721-1","text":"Yicheng Pan 0001"},{"@pid":"72/6275","text":"Xuechen Li"}]},"title":"Homophyly and Randomness Resist Cascading Failure in Networks.","venue":"CoRR","volume":"abs/1310.8040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZPL13","ee":"http://arxiv.org/abs/1310.8040","url":"https://dblp.org/rec/journals/corr/LiZPL13"}, "url":"URL#4255622" }, { "@score":"1", "@id":"4255623", "info":{"authors":{"author":[{"@pid":"25/3528","text":"Xu Li"},{"@pid":"41/4882","text":"Shengli Zhang"},{"@pid":"122/5600","text":"Gongbin Qian"}]},"title":"Mapping and Coding Design for Channel Coded Physical-layer Network Coding.","venue":"CoRR","volume":"abs/1310.0611","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZQ13","ee":"http://arxiv.org/abs/1310.0611","url":"https://dblp.org/rec/journals/corr/LiZQ13"}, "url":"URL#4255623" }, { "@score":"1", "@id":"4255641", "info":{"authors":{"author":[{"@pid":"136/5687","text":"Rui Ligeiro"},{"@pid":"49/4111","text":"Rui Vilela Mendes"}]},"title":"Learning ambiguous functions by neural networks.","venue":"CoRR","volume":"abs/1310.1250","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LigeiroM13","ee":"http://arxiv.org/abs/1310.1250","url":"https://dblp.org/rec/journals/corr/LigeiroM13"}, "url":"URL#4255641" }, { "@score":"1", "@id":"4255650", "info":{"authors":{"author":[{"@pid":"21/9365","text":"Xingqin Lin"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"},{"@pid":"83/5785","text":"Amitava Ghosh"},{"@pid":"15/1806","text":"Rapeepat Ratasuk"}]},"title":"An Overview on 3GPP Device-to-Device Proximity Services.","venue":"CoRR","volume":"abs/1310.0116","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinAGR13","ee":"http://arxiv.org/abs/1310.0116","url":"https://dblp.org/rec/journals/corr/LinAGR13"}, "url":"URL#4255650" }, { "@score":"1", "@id":"4255665", "info":{"authors":{"author":[{"@pid":"36/1476","text":"Svante Linusson"},{"@pid":"136/6048","text":"Gustav Ryd"}]},"title":"Dynamic adjustment: an electoral method for relaxed double proportionality.","venue":"CoRR","volume":"abs/1310.8146","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinussonR13","ee":"http://arxiv.org/abs/1310.8146","url":"https://dblp.org/rec/journals/corr/LinussonR13"}, "url":"URL#4255665" }, { "@score":"1", "@id":"4255667", "info":{"authors":{"author":{"@pid":"30/5015","text":"Yaron Lipman"}},"title":"Construction of Injective Mappings Of Meshes.","venue":"CoRR","volume":"abs/1310.0955","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lipman13","ee":"http://arxiv.org/abs/1310.0955","url":"https://dblp.org/rec/journals/corr/Lipman13"}, "url":"URL#4255667" }, { "@score":"1", "@id":"4255670", "info":{"authors":{"author":[{"@pid":"76/5110","text":"Viliam Lisý"},{"@pid":"136/6061","text":"Vojtech Kovarík"},{"@pid":"64/10094","text":"Marc Lanctot"},{"@pid":"24/5039","text":"Branislav Bosanský"}]},"title":"Convergence of Monte Carlo Tree Search in Simultaneous Move Games.","venue":"CoRR","volume":"abs/1310.8613","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LisyKLB13","ee":"http://arxiv.org/abs/1310.8613","url":"https://dblp.org/rec/journals/corr/LisyKLB13"}, "url":"URL#4255670" }, { "@score":"1", "@id":"4255688", "info":{"authors":{"author":[{"@pid":"81/7010","text":"Xi Liu"},{"@pid":"46/6786","text":"Li Gong"},{"@pid":"62/8500","text":"Yongxi Gong"},{"@pid":"97/2274-3","text":"Yu Liu 0003"}]},"title":"Revealing daily travel patterns and city structure with taxi trip data.","venue":"CoRR","volume":"abs/1310.6592","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuGGL13","ee":"http://arxiv.org/abs/1310.6592","url":"https://dblp.org/rec/journals/corr/LiuGGL13"}, "url":"URL#4255688" }, { "@score":"1", "@id":"4255694", "info":{"authors":{"author":[{"@pid":"95/3736-12","text":"Jun Liu 0012"},{"@pid":"02/5276","text":"Ting-Zhu Huang"},{"@pid":"49/3099","text":"Ivan W. Selesnick"},{"@pid":"38/1060","text":"Xiao-Guang Lv"},{"@pid":"70/6678-3","text":"Po-Yu Chen 0003"}]},"title":"Image Restoration using Total Variation with Overlapping Group Sparsity.","venue":"CoRR","volume":"abs/1310.3447","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuHSLC13","ee":"http://arxiv.org/abs/1310.3447","url":"https://dblp.org/rec/journals/corr/LiuHSLC13"}, "url":"URL#4255694" }, { "@score":"1", "@id":"4255711", "info":{"authors":{"author":[{"@pid":"82/8066","text":"Risheng Liu"},{"@pid":"l/ZhouchenLin","text":"Zhouchen Lin"},{"@pid":"96/4421","text":"Zhixun Su"}]},"title":"Linearized Alternating Direction Method with Parallel Splitting and Adaptive Penalty for Separable Convex Programs in Machine Learning.","venue":"CoRR","volume":"abs/1310.5035","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuLS13a","ee":"http://arxiv.org/abs/1310.5035","url":"https://dblp.org/rec/journals/corr/LiuLS13a"}, "url":"URL#4255711" }, { "@score":"1", "@id":"4255717", "info":{"authors":{"author":[{"@pid":"97/2274-3","text":"Yu Liu 0003"},{"@pid":"30/8501","text":"Zhengwei Sui"},{"@pid":"33/8500","text":"Chaogui Kang"},{"@pid":"181/2643-3","text":"Yong Gao 0003"}]},"title":"Uncovering patterns of inter-urban trips and spatial interactions from check-in data.","venue":"CoRR","volume":"abs/1310.0282","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuSKG13","ee":"http://arxiv.org/abs/1310.0282","url":"https://dblp.org/rec/journals/corr/LiuSKG13"}, "url":"URL#4255717" }, { "@score":"1", "@id":"4255718", "info":{"authors":{"author":[{"@pid":"91/9687","text":"Fayao Liu"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"r/IanDReid1","text":"Ian Reid 0001"},{"@pid":"v/AntonvandenHengel","text":"Anton van den Hengel"}]},"title":"Online Unsupervised Feature Learning for Visual Tracking.","venue":"CoRR","volume":"abs/1310.1690","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuSRH13","ee":"http://arxiv.org/abs/1310.1690","url":"https://dblp.org/rec/journals/corr/LiuSRH13"}, "url":"URL#4255718" }, { "@score":"1", "@id":"4255727", "info":{"authors":{"author":[{"@pid":"15/5923","text":"Chao Liu"},{"@pid":"95/3092","text":"Feng Xi"},{"@pid":"55/125","text":"Shengyao Chen"},{"@pid":"30/2371","text":"Zhong Liu"}]},"title":"Pulse-Doppler Signal Processing with Quadrature Compressive Sampling.","venue":"CoRR","volume":"abs/1310.5409","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuXCL13","ee":"http://arxiv.org/abs/1310.5409","url":"https://dblp.org/rec/journals/corr/LiuXCL13"}, "url":"URL#4255727" }, { "@score":"1", "@id":"4255730", "info":{"authors":{"author":[{"@pid":"97/4626-6","text":"Yi Liu 0006"},{"@pid":"83/4637-1","text":"Xiang-Gen Xia 0001"},{"@pid":"04/1131-1","text":"Hailin Zhang 0001"}]},"title":"Distributed Space-Time Coding for Full-Duplex Asynchronous Cooperative Communications.","venue":"CoRR","volume":"abs/1310.2051","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuXZ13","ee":"http://arxiv.org/abs/1310.2051","url":"https://dblp.org/rec/journals/corr/LiuXZ13"}, "url":"URL#4255730" }, { "@score":"1", "@id":"4255731", "info":{"authors":{"author":[{"@pid":"97/4626-6","text":"Yi Liu 0006"},{"@pid":"83/4637-1","text":"Xiang-Gen Xia 0001"},{"@pid":"04/1131-1","text":"Hailin Zhang 0001"}]},"title":"Distributed Linear Convolutional Space-Time Coding for Two-Relay Full-Duplex Asynchronous Cooperative Networks.","venue":"CoRR","volume":"abs/1310.2055","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuXZ13a","ee":"http://arxiv.org/abs/1310.2055","url":"https://dblp.org/rec/journals/corr/LiuXZ13a"}, "url":"URL#4255731" }, { "@score":"1", "@id":"4255734", "info":{"authors":{"author":[{"@pid":"25/3327-1","text":"Tingting Liu 0001"},{"@pid":"32/2760","text":"Chenyang Yang 0001"}]},"title":"On the Degrees of Freedom of Asymmetric MIMO Interference Broadcast Channels.","venue":"CoRR","volume":"abs/1310.7311","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuY13a","ee":"http://arxiv.org/abs/1310.7311","url":"https://dblp.org/rec/journals/corr/LiuY13a"}, "url":"URL#4255734" }, { "@score":"1", "@id":"4255742", "info":{"authors":{"author":[{"@pid":"16/3621","text":"Juan Liu"},{"@pid":"80/3887-1","text":"Baochang Zhang 0001"},{"@pid":"88/5607","text":"LinLin Shen"},{"@pid":"l/JianzhuangLiu","text":"Jianzhuang Liu"},{"@pid":"67/3361","text":"Jason Zhao"}]},"title":"The BeiHang Keystroke Dynamics Authentication System.","venue":"CoRR","volume":"abs/1310.4485","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuZSLZ13","ee":"http://arxiv.org/abs/1310.4485","url":"https://dblp.org/rec/journals/corr/LiuZSLZ13"}, "url":"URL#4255742" }, { "@score":"1", "@id":"4255743", "info":{"authors":{"author":[{"@pid":"91/9687","text":"Fayao Liu"},{"@pid":"45/933","text":"Luping Zhou"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"16/4535","text":"Jianping Yin"}]},"title":"Multiple Kernel Learning in the Primal for Multi-modal Alzheimer's Disease Classification.","venue":"CoRR","volume":"abs/1310.0890","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuZSY13","ee":"http://arxiv.org/abs/1310.0890","url":"https://dblp.org/rec/journals/corr/LiuZSY13"}, "url":"URL#4255743" }, { "@score":"1", "@id":"4255749", "info":{"authors":{"author":[{"@pid":"136/5608","text":"Ivan Livinsky"},{"@pid":"09/11016","text":"Alexander Lange"},{"@pid":"77/4036","text":"Stanislaw P. Radziszowski"}]},"title":"Computation of the Ramsey Numbers $R(C_4, K_9)$ and $R(C_4, K_{10})$.","venue":"CoRR","volume":"abs/1310.3017","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LivinskyLR13","ee":"http://arxiv.org/abs/1310.3017","url":"https://dblp.org/rec/journals/corr/LivinskyLR13"}, "url":"URL#4255749" }, { "@score":"1", "@id":"4255751", "info":{"authors":{"author":{"@pid":"52/5575","text":"Seth Lloyd"}},"title":"A Turing test for free will.","venue":"CoRR","volume":"abs/1310.3225","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lloyd13","ee":"http://arxiv.org/abs/1310.3225","url":"https://dblp.org/rec/journals/corr/Lloyd13"}, "url":"URL#4255751" }, { "@score":"1", "@id":"4255755", "info":{"authors":{"author":[{"@pid":"l/SvenLoncaric","text":"Sven Loncaric"},{"@pid":"136/5877","text":"Sinisa Sevigc"}]},"title":"Second Croatian Computer Vision Workshop (CCVW 2013).","venue":"CoRR","volume":"abs/1310.0319","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoncaricS13","ee":"http://arxiv.org/abs/1310.0319","url":"https://dblp.org/rec/journals/corr/LoncaricS13"}, "url":"URL#4255755" }, { "@score":"1", "@id":"4255759", "info":{"authors":{"author":[{"@pid":"136/6057","text":"Markan Lopar"},{"@pid":"83/3415","text":"Slobodan Ribaric"}]},"title":"An Overview and Evaluation of Various Face and Eyes Detection Algorithms for Driver Fatigue Monitoring Systems.","venue":"CoRR","volume":"abs/1310.0317","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoparR13","ee":"http://arxiv.org/abs/1310.0317","url":"https://dblp.org/rec/journals/corr/LoparR13"}, "url":"URL#4255759" }, { "@score":"1", "@id":"4255760", "info":{"authors":{"author":[{"@pid":"23/3801","text":"Manuel Lopes 0001"},{"@pid":"233/1086","text":"Benjamin Clément"},{"@pid":"136/6146","text":"Didier Roy"},{"@pid":"33/5513","text":"Pierre-Yves Oudeyer"}]},"title":"Multi-Armed Bandits for Intelligent Tutoring Systems.","venue":"CoRR","volume":"abs/1310.3174","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LopesCRO13","ee":"http://arxiv.org/abs/1310.3174","url":"https://dblp.org/rec/journals/corr/LopesCRO13"}, "url":"URL#4255760" }, { "@score":"1", "@id":"4255782", "info":{"authors":{"author":[{"@pid":"129/1690","text":"Bradley R. Lowery"},{"@pid":"l/JulienLangou","text":"Julien Langou"}]},"title":"A Greedy Algorithm for Optimally Pipelining a Reduction.","venue":"CoRR","volume":"abs/1310.4645","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoweryL13","ee":"http://arxiv.org/abs/1310.4645","url":"https://dblp.org/rec/journals/corr/LoweryL13"}, "url":"URL#4255782" }, { "@score":"1", "@id":"4255821", "info":{"authors":{"author":{"@pid":"61/7036","text":"Jack H. Lutz"}},"title":"The Frequent Paucity of Trivial Strings.","venue":"CoRR","volume":"abs/1310.6383","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lutz13","ee":"http://arxiv.org/abs/1310.6383","url":"https://dblp.org/rec/journals/corr/Lutz13"}, "url":"URL#4255821" }, { "@score":"1", "@id":"4255823", "info":{"authors":{"author":[{"@pid":"77/4591","text":"Tiejun Lv"},{"@pid":"94/2468","text":"Zhang Zhang"},{"@pid":"03/10239","text":"Shaoshi Yang"}]},"title":"A low complexity approach of combining cooperative diversity and multiuser diversity in multiuser cooperative networks.","venue":"CoRR","volume":"abs/1310.3248","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvZY13","ee":"http://arxiv.org/abs/1310.3248","url":"https://dblp.org/rec/journals/corr/LvZY13"}, "url":"URL#4255823" }, { "@score":"1", "@id":"4255827", "info":{"authors":{"author":{"@pid":"78/10122","text":"Dheerendra Mishra"}},"title":"The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems.","venue":"CoRR","volume":"abs/1310.5896","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MIshra13","ee":"http://arxiv.org/abs/1310.5896","url":"https://dblp.org/rec/journals/corr/MIshra13"}, "url":"URL#4255827" }, { "@score":"1", "@id":"4255830", "info":{"authors":{"author":{"@pid":"95/2106","text":"Li Ma"}},"title":"Harnack's inequality and Green functions on locally finite graphs.","venue":"CoRR","volume":"abs/1310.8390","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ma13a","ee":"http://arxiv.org/abs/1310.8390","url":"https://dblp.org/rec/journals/corr/Ma13a"}, "url":"URL#4255830" }, { "@score":"1", "@id":"4255833", "info":{"authors":{"author":[{"@pid":"66/4603","text":"Yuanyuan Ma"},{"@pid":"136/5982","text":"Harald Fretheim"},{"@pid":"16/10334","text":"Erik Persson"},{"@pid":"136/5848","text":"Trond Haugen"}]},"title":"An Iterative Method Applied to Correct the Actual Compressor Performance to the Equivalent Performance under the Specified Reference Conditions.","venue":"CoRR","volume":"abs/1310.2086","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaFPH13","ee":"http://arxiv.org/abs/1310.2086","url":"https://dblp.org/rec/journals/corr/MaFPH13"}, "url":"URL#4255833" }, { "@score":"1", "@id":"4255834", "info":{"authors":{"author":[{"@pid":"254/7399","text":"Shuai Ma"},{"@pid":"57/8053","text":"Mingyi Hong"},{"@pid":"96/838","text":"Enbin Song"},{"@pid":"84/4695","text":"Xiangfeng Wang"},{"@pid":"81/6299","text":"Dechun Sun"}]},"title":"Outage Constrained Robust Secure Transmission for MISO Wiretap Channels.","venue":"CoRR","volume":"abs/1310.7158","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaHSWS13","ee":"http://arxiv.org/abs/1310.7158","url":"https://dblp.org/rec/journals/corr/MaHSWS13"}, "url":"URL#4255834" }, { "@score":"1", "@id":"4255836", "info":{"authors":{"author":[{"@pid":"35/573-1","text":"Xiao Ma 0001"},{"@pid":"17/2654","text":"Lei Lin"},{"@pid":"115/6838","text":"Chulong Liang"},{"@pid":"22/5792","text":"Xiujie Huang"},{"@pid":"80/1849","text":"Baoming Bai"}]},"title":"An information spectrum approach to the capacity region of GIFC.","venue":"CoRR","volume":"abs/1310.1536","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaLLHB13","ee":"http://arxiv.org/abs/1310.1536","url":"https://dblp.org/rec/journals/corr/MaLLHB13"}, "url":"URL#4255836" }, { "@score":"1", "@id":"4255845", "info":{"authors":{"author":[{"@pid":"85/8757","text":"Roland Maas"},{"@pid":"136/4944","text":"Christian Huemmer 0001"},{"@pid":"71/8056","text":"Armin Sehr"},{"@pid":"83/1301","text":"Walter Kellermann"}]},"title":"A Bayesian Network View on Acoustic Model-Based Techniques for Robust Speech Recognition.","venue":"CoRR","volume":"abs/1310.3099","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaasHSK13","ee":"http://arxiv.org/abs/1310.3099","url":"https://dblp.org/rec/journals/corr/MaasHSK13"}, "url":"URL#4255845" }, { "@score":"1", "@id":"4255848", "info":{"authors":{"author":[{"@pid":"00/6107","text":"Edita Mácajová"},{"@pid":"65/4411","text":"Ján Mazák"}]},"title":"Cubic graphs with large circumference deficit.","venue":"CoRR","volume":"abs/1310.1042","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MacajovaM13","ee":"http://arxiv.org/abs/1310.1042","url":"https://dblp.org/rec/journals/corr/MacajovaM13"}, "url":"URL#4255848" }, { "@score":"1", "@id":"4255856", "info":{"authors":{"author":[{"@pid":"47/5851","text":"Nicolas Macris"},{"@pid":"84/10964","text":"Marc Vuffray"}]},"title":"The Bethe Free Energy Allows to Compute the Conditional Entropy of Graphical Code Instances. A Proof from the Polymer Expansion.","venue":"CoRR","volume":"abs/1310.1294","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MacrisV13","ee":"http://arxiv.org/abs/1310.1294","url":"https://dblp.org/rec/journals/corr/MacrisV13"}, "url":"URL#4255856" }, { "@score":"1", "@id":"4255860", "info":{"authors":{"author":[{"@pid":"77/11044","text":"Daria Madjidian"},{"@pid":"46/3525","text":"Leonid Mirkin"}]},"title":"Distributed Control with Low-Rank Coordination.","venue":"CoRR","volume":"abs/1310.1025","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MadjidianM13","ee":"http://arxiv.org/abs/1310.1025","url":"https://dblp.org/rec/journals/corr/MadjidianM13"}, "url":"URL#4255860" }, { "@score":"1", "@id":"4255871", "info":{"authors":{"author":[{"@pid":"08/8693","text":"Dhruv Mahajan 0001"},{"@pid":"35/6732","text":"S. Sathiya Keerthi"},{"@pid":"86/2741","text":"S. Sundararajan"},{"@pid":"30/1046","text":"Léon Bottou"}]},"title":"A Functional Approximation Based Distributed Learning Algorithm.","venue":"CoRR","volume":"abs/1310.8418","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahajanKSB13","ee":"http://arxiv.org/abs/1310.8418","url":"https://dblp.org/rec/journals/corr/MahajanKSB13"}, "url":"URL#4255871" }, { "@score":"1", "@id":"4255873", "info":{"authors":{"author":[{"@pid":"84/6024","text":"Aditya Mahajan"},{"@pid":"136/5771","text":"Mehnaz Mannan"}]},"title":"Decentralized stochastic control.","venue":"CoRR","volume":"abs/1310.4545","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahajanM13","ee":"http://arxiv.org/abs/1310.4545","url":"https://dblp.org/rec/journals/corr/MahajanM13"}, "url":"URL#4255873" }, { "@score":"1", "@id":"4255875", "info":{"authors":{"author":[{"@pid":"05/1936","text":"Alireza S. Mahani"},{"@pid":"136/5755","text":"Mansour T. A. Sharabiani"}]},"title":"SIMD Parallel Gibbs Sampling of Probabilistic Directed Acyclic Graphs.","venue":"CoRR","volume":"abs/1310.1537","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahaniS13","ee":"http://arxiv.org/abs/1310.1537","url":"https://dblp.org/rec/journals/corr/MahaniS13"}, "url":"URL#4255875" }, { "@score":"1", "@id":"4255889", "info":{"authors":{"author":[{"@pid":"45/9587","text":"Hamed Mahmoudi"},{"@pid":"96/4132","text":"Georgios Rodolakis"},{"@pid":"13/55","text":"Leonidas Georgiadis"},{"@pid":"57/1177","text":"David Saad"}]},"title":"Message-Passing Algorithms for Optimal Utilization of Cognitive Radio Networks.","venue":"CoRR","volume":"abs/1310.5468","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahmoudiRGS13","ee":"http://arxiv.org/abs/1310.5468","url":"https://dblp.org/rec/journals/corr/MahmoudiRGS13"}, "url":"URL#4255889" }, { "@score":"1", "@id":"4255891", "info":{"authors":{"author":[{"@pid":"88/8008","text":"Mohamed Khalil El Mahrsi"},{"@pid":"23/2793","text":"Fabrice Rossi"}]},"title":"Graph-Based Approaches to Clustering Network-Constrained Trajectory Data.","venue":"CoRR","volume":"abs/1310.5249","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahrsiR13","ee":"http://arxiv.org/abs/1310.5249","url":"https://dblp.org/rec/journals/corr/MahrsiR13"}, "url":"URL#4255891" }, { "@score":"1", "@id":"4255894", "info":{"authors":{"author":{"@pid":"136/5761","text":"Tirus Muya Maina"}},"title":"Instant messaging an effective way of communication in workplace.","venue":"CoRR","volume":"abs/1310.8489","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Maina13","ee":"http://arxiv.org/abs/1310.8489","url":"https://dblp.org/rec/journals/corr/Maina13"}, "url":"URL#4255894" }, { "@score":"1", "@id":"4255902", "info":{"authors":{"author":[{"@pid":"43/863","text":"Behrooz Makki"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"64/2235","text":"Thomas Eriksson"}]},"title":"On Noisy ARQ in Block-Fading Channels.","venue":"CoRR","volume":"abs/1310.3946","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakkiAE13","ee":"http://arxiv.org/abs/1310.3946","url":"https://dblp.org/rec/journals/corr/MakkiAE13"}, "url":"URL#4255902" }, { "@score":"1", "@id":"4255903", "info":{"authors":{"author":[{"@pid":"43/863","text":"Behrooz Makki"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"64/2235","text":"Thomas Eriksson"}]},"title":"Green Communication via Power-optimized HARQ Protocols.","venue":"CoRR","volume":"abs/1310.3970","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakkiAE13a","ee":"http://arxiv.org/abs/1310.3970","url":"https://dblp.org/rec/journals/corr/MakkiAE13a"}, "url":"URL#4255903" }, { "@score":"1", "@id":"4255904", "info":{"authors":{"author":[{"@pid":"43/863","text":"Behrooz Makki"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"64/2235","text":"Thomas Eriksson"}]},"title":"HARQ Feedback in Spectrum Sharing Networks.","venue":"CoRR","volume":"abs/1310.3975","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakkiAE13b","ee":"http://arxiv.org/abs/1310.3975","url":"https://dblp.org/rec/journals/corr/MakkiAE13b"}, "url":"URL#4255904" }, { "@score":"1", "@id":"4255922", "info":{"authors":{"author":[{"@pid":"136/6042","text":"Akaki Mamageishvili"},{"@pid":"39/6388","text":"Matús Mihalák"},{"@pid":"136/5969","text":"Dominik Müller"}]},"title":"Tree Nash Equilibria in the Network Creation Game.","venue":"CoRR","volume":"abs/1310.8245","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MamageishviliMM13","ee":"http://arxiv.org/abs/1310.8245","url":"https://dblp.org/rec/journals/corr/MamageishviliMM13"}, "url":"URL#4255922" }, { "@score":"1", "@id":"4255928", "info":{"authors":{"author":[{"@pid":"22/4954","text":"Ian R. Manchester"},{"@pid":"136/5623","text":"Jack Umenberger"}]},"title":"Real-Time Planning with Primitives for Dynamic Walking over Uneven Terrain.","venue":"CoRR","volume":"abs/1310.7062","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ManchesterU13","ee":"http://arxiv.org/abs/1310.7062","url":"https://dblp.org/rec/journals/corr/ManchesterU13"}, "url":"URL#4255928" }, { "@score":"1", "@id":"4255951", "info":{"authors":{"author":[{"@pid":"90/7908","text":"Piergiuseppe Di Marco"},{"@pid":"78/3236","text":"George Athanasiou"},{"@pid":"132/8327","text":"Prodromos-Vasileios Mekikis"},{"@pid":"61/6100","text":"Carlo Fischione"}]},"title":"MAC-aware Routing Metrics for the Internet of Things.","venue":"CoRR","volume":"abs/1310.4632","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarcoAMF13","ee":"http://arxiv.org/abs/1310.4632","url":"https://dblp.org/rec/journals/corr/MarcoAMF13"}, "url":"URL#4255951" }, { "@score":"1", "@id":"4255953", "info":{"authors":{"author":[{"@pid":"23/3110","text":"Javier Marenco"},{"@pid":"72/4565","text":"Marcelo Mydlarz"},{"@pid":"86/5488","text":"Daniel E. Severín"}]},"title":"Additive Coloring with Fixed Orientations.","venue":"CoRR","volume":"abs/1310.4141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarencoMS13","ee":"http://arxiv.org/abs/1310.4141","url":"https://dblp.org/rec/journals/corr/MarencoMS13"}, "url":"URL#4255953" }, { "@score":"1", "@id":"4255971", "info":{"authors":{"author":[{"@pid":"116/9873","text":"Travis Martin"},{"@pid":"21/1633","text":"Grant Schoenebeck"},{"@pid":"w/MichaelPWellman","text":"Michael P. Wellman"}]},"title":"Characterizing Strategic Cascades on Networks.","venue":"CoRR","volume":"abs/1310.2561","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MartinSW13","ee":"http://arxiv.org/abs/1310.2561","url":"https://dblp.org/rec/journals/corr/MartinSW13"}, "url":"URL#4255971" }, { "@score":"1", "@id":"4255977", "info":{"authors":{"author":[{"@pid":"76/8510","text":"Xavier Martinez-Palau"},{"@pid":"58/2864","text":"David Dominguez-Sal"},{"@pid":"25/3618","text":"Reza Akbarinia"},{"@pid":"v/PatrickValduriez","text":"Patrick Valduriez"},{"@pid":"03/5767","text":"Josep Lluís Larriba-Pey"}]},"title":"On Demand Memory Specialization for Distributed Graph Databases.","venue":"CoRR","volume":"abs/1310.4802","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Martinez-PalauDAVL13","ee":"http://arxiv.org/abs/1310.4802","url":"https://dblp.org/rec/journals/corr/Martinez-PalauDAVL13"}, "url":"URL#4255977" }, { "@score":"1", "@id":"4255991", "info":{"authors":{"author":[{"@pid":"136/5742","text":"Seth A. Marvel"},{"@pid":"116/9873","text":"Travis Martin"},{"@pid":"74/8942","text":"Charles R. Doering"},{"@pid":"67/7250","text":"David Lusseau"},{"@pid":"n/MEJNewman","text":"M. E. J. Newman"}]},"title":"The small-world effect is a modern phenomenon.","venue":"CoRR","volume":"abs/1310.2636","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarvelMDLN13","ee":"http://arxiv.org/abs/1310.2636","url":"https://dblp.org/rec/journals/corr/MarvelMDLN13"}, "url":"URL#4255991" }, { "@score":"1", "@id":"4256012", "info":{"authors":{"author":[{"@pid":"63/9829","text":"Joachim Mathiesen"},{"@pid":"136/5725","text":"Luiza Angheluta"},{"@pid":"136/6157","text":"Peter T. H. Ahlgren"},{"@pid":"29/9828","text":"Mogens H. Jensen"}]},"title":"Excitable human dynamics driven by extrinsic events in massive communities.","venue":"CoRR","volume":"abs/1310.7346","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MathiesenAAJ13","ee":"http://arxiv.org/abs/1310.7346","url":"https://dblp.org/rec/journals/corr/MathiesenAAJ13"}, "url":"URL#4256012" }, { "@score":"1", "@id":"4256013", "info":{"authors":{"author":[{"@pid":"136/6033","text":"Adwaitvedant S. Mathkar"},{"@pid":"44/92","text":"Vivek S. Borkar"}]},"title":"Distributed Reinforcement Learning via Gossip.","venue":"CoRR","volume":"abs/1310.7610","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MathkarB13","ee":"http://arxiv.org/abs/1310.7610","url":"https://dblp.org/rec/journals/corr/MathkarB13"}, "url":"URL#4256013" }, { "@score":"1", "@id":"4256025", "info":{"authors":{"author":[{"@pid":"55/5647","text":"Frantisek Matús"},{"@pid":"73/347","text":"László Csirmaz"}]},"title":"Entropy region and convolution.","venue":"CoRR","volume":"abs/1310.5957","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MatusC13","ee":"http://arxiv.org/abs/1310.5957","url":"https://dblp.org/rec/journals/corr/MatusC13"}, "url":"URL#4256025" }, { "@score":"1", "@id":"4256040", "info":{"authors":{"author":[{"@pid":"136/5882","text":"Richard Mayne"},{"@pid":"68/6382","text":"David Patton"},{"@pid":"11/6457","text":"Ben de Lacy Costello"},{"@pid":"a/AndrewAdamatzky","text":"Andrew Adamatzky"},{"@pid":"136/5830","text":"Rosemary Camilla Patton"}]},"title":"On the internalisation, intraplasmodial carriage and excretion of metallic nanoparticles in the slime mould Physarum polycephalum.","venue":"CoRR","volume":"abs/1310.6078","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaynePCAP13","ee":"http://arxiv.org/abs/1310.6078","url":"https://dblp.org/rec/journals/corr/MaynePCAP13"}, "url":"URL#4256040" }, { "@score":"1", "@id":"4256042", "info":{"authors":{"author":[{"@pid":"59/561","text":"Philipp Mayr 0001"},{"@pid":"02/1053","text":"Andrea Scharnhorst"},{"@pid":"34/421","text":"Birger Larsen"},{"@pid":"67/8577","text":"Philipp Schaer"},{"@pid":"m/PeterMutschke","text":"Peter Mutschke"}]},"title":"Bibliometric-enhanced Information Retrieval.","venue":"CoRR","volume":"abs/1310.8226","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MayrSLSM13","ee":"http://arxiv.org/abs/1310.8226","url":"https://dblp.org/rec/journals/corr/MayrSLSM13"}, "url":"URL#4256042" }, { "@score":"1", "@id":"4256053", "info":{"authors":{"author":[{"@pid":"119/4841","text":"Ciaran McCreesh"},{"@pid":"14/3015","text":"Patrick Prosser"}]},"title":"Greedy Graph Colouring is a Misleading Heuristic.","venue":"CoRR","volume":"abs/1310.7741","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/McCreeshP13","ee":"http://arxiv.org/abs/1310.7741","url":"https://dblp.org/rec/journals/corr/McCreeshP13"}, "url":"URL#4256053" }, { "@score":"1", "@id":"4256060", "info":{"authors":{"author":[{"@pid":"126/6008","text":"Gary A. McGilvary"},{"@pid":"24/4847","text":"Josep Rius 0002"},{"@pid":"47/3727","text":"Iñigo Goiri"},{"@pid":"63/5990","text":"Francesc Solsona"},{"@pid":"24/1959","text":"Adam Barker"},{"@pid":"a/MalcolmPAtkinson","text":"Malcolm P. Atkinson 0001"}]},"title":"C2MS: Dynamic Monitoring and Management of Cloud Infrastructures.","venue":"CoRR","volume":"abs/1310.2148","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/McGilvaryTGSBA13","ee":"http://arxiv.org/abs/1310.2148","url":"https://dblp.org/rec/journals/corr/McGilvaryTGSBA13"}, "url":"URL#4256060" }, { "@score":"1", "@id":"4256063", "info":{"authors":{"author":[{"@pid":"m/AnnabelleMcIver","text":"Annabelle McIver"},{"@pid":"98/9715","text":"Tahiry M. Rabehaja"},{"@pid":"57/4783","text":"Georg Struth"}]},"title":"An Event Structure Model for Probabilistic Concurrent Kleene Algebra.","venue":"CoRR","volume":"abs/1310.2320","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/McIverRS13a","ee":"http://arxiv.org/abs/1310.2320","url":"https://dblp.org/rec/journals/corr/McIverRS13a"}, "url":"URL#4256063" }, { "@score":"1", "@id":"4256071", "info":{"authors":{"author":[{"@pid":"69/1569","text":"Olivier Mehani"},{"@pid":"62/3483","text":"Roksana Boreli"},{"@pid":"51/2666","text":"Guillaume Jourjon"},{"@pid":"60/3016","text":"Thierry Ernst"}]},"title":"Rate Control Adaptation for Heterogeneous Handovers.","venue":"CoRR","volume":"abs/1310.5446","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehaniBJE13","ee":"http://arxiv.org/abs/1310.5446","url":"https://dblp.org/rec/journals/corr/MehaniBJE13"}, "url":"URL#4256071" }, { "@score":"1", "@id":"4256075", "info":{"authors":{"author":{"@pid":"35/2145-2","text":"Rahul Mehta 0002"}},"title":"A New Push-Relabel Algorithm for the Maximum Flow Problem.","venue":"CoRR","volume":"abs/1310.7840","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mehta13a","ee":"http://arxiv.org/abs/1310.7840","url":"https://dblp.org/rec/journals/corr/Mehta13a"}, "url":"URL#4256075" }, { "@score":"1", "@id":"4256091", "info":{"authors":{"author":[{"@pid":"m/PAMellies","text":"Paul-André Melliès"},{"@pid":"17/126","text":"Noam Zeilberger"}]},"title":"Type refinement and monoidal closed bifibrations.","venue":"CoRR","volume":"abs/1310.0263","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MelliesZ13","ee":"http://arxiv.org/abs/1310.0263","url":"https://dblp.org/rec/journals/corr/MelliesZ13"}, "url":"URL#4256091" }, { "@score":"1", "@id":"4256092", "info":{"authors":{"author":[{"@pid":"65/169","text":"Tarek Melliti"},{"@pid":"61/8101","text":"Mathilde Noual"},{"@pid":"27/1155","text":"Damien Regnault"},{"@pid":"78/5277","text":"Sylvain Sené"},{"@pid":"136/5893","text":"Jérémy Sobieraj"}]},"title":"Full characterization of attractors for two intersected asynchronous Boolean automata cycles.","venue":"CoRR","volume":"abs/1310.5747","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MellitiNRSS13","ee":"http://arxiv.org/abs/1310.5747","url":"https://dblp.org/rec/journals/corr/MellitiNRSS13"}, "url":"URL#4256092" }, { "@score":"1", "@id":"4256107", "info":{"authors":{"author":[{"@pid":"94/5332","text":"Pasquale De Meo"},{"@pid":"38/8773","text":"Emilio Ferrara"},{"@pid":"23/5055","text":"Fabian Abel"},{"@pid":"42/6100","text":"Lora Aroyo"},{"@pid":"h/GeertJanHouben","text":"Geert-Jan Houben"}]},"title":"Analyzing User Behavior across Social Sharing Environments.","venue":"CoRR","volume":"abs/1310.4399","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MeoFAAH13","ee":"http://arxiv.org/abs/1310.4399","url":"https://dblp.org/rec/journals/corr/MeoFAAH13"}, "url":"URL#4256107" }, { "@score":"1", "@id":"4256111", "info":{"authors":{"author":{"@pid":"92/1103","text":"Neri Merhav"}},"title":"Asymptotically optimal decision rules for joint detection and source coding.","venue":"CoRR","volume":"abs/1310.4939","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Merhav13a","ee":"http://arxiv.org/abs/1310.4939","url":"https://dblp.org/rec/journals/corr/Merhav13a"}, "url":"URL#4256111" }, { "@score":"1", "@id":"4256113", "info":{"authors":{"author":[{"@pid":"56/9363","text":"Hugo Méric"},{"@pid":"51/2027","text":"José Miguel Piquer"}]},"title":"DVB-S2 Spectrum Efficiency Improvement with Hierarchical Modulation.","venue":"CoRR","volume":"abs/1310.0677","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MericP13","ee":"http://arxiv.org/abs/1310.0677","url":"https://dblp.org/rec/journals/corr/MericP13"}, "url":"URL#4256113" }, { "@score":"1", "@id":"4256116", "info":{"authors":{"author":[{"@pid":"08/9458","text":"Sears A. Merritt"},{"@pid":"97/4275","text":"Aaron Clauset"}]},"title":"Scoring dynamics across professional team sports: tempo, balance and predictability.","venue":"CoRR","volume":"abs/1310.4461","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MerrittC13a","ee":"http://arxiv.org/abs/1310.4461","url":"https://dblp.org/rec/journals/corr/MerrittC13a"}, "url":"URL#4256116" }, { "@score":"1", "@id":"4256123", "info":{"authors":{"author":{"@pid":"42/1094","text":"Rodney Van Meter"}},"title":"Quantum Computing's Classical Problem, Classical Computing's Quantum Problem.","venue":"CoRR","volume":"abs/1310.2040","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Meter13","ee":"http://arxiv.org/abs/1310.2040","url":"https://dblp.org/rec/journals/corr/Meter13"}, "url":"URL#4256123" }, { "@score":"1", "@id":"4256141", "info":{"authors":{"author":[{"@pid":"62/7481","text":"Loïc Michel"},{"@pid":"80/4591","text":"Wim Michiels"},{"@pid":"99/1894","text":"Xavier Boucher"}]},"title":"Model-free control of nonlinear power converters.","venue":"CoRR","volume":"abs/1310.2477","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MichelMB13","ee":"http://arxiv.org/abs/1310.2477","url":"https://dblp.org/rec/journals/corr/MichelMB13"}, "url":"URL#4256141" }, { "@score":"1", "@id":"4256144", "info":{"authors":{"author":[{"@pid":"m/MarinoMiculan","text":"Marino Miculan"},{"@pid":"136/6159","text":"Marco Peressotti"}]},"title":"Weak bisimulations for labelled transition systems weighted over semirings.","venue":"CoRR","volume":"abs/1310.4106","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MiculanP13","ee":"http://arxiv.org/abs/1310.4106","url":"https://dblp.org/rec/journals/corr/MiculanP13"}, "url":"URL#4256144" }, { "@score":"1", "@id":"4256145", "info":{"authors":{"author":{"@pid":"v/PietVanMieghem","text":"Piet Van Mieghem"}},"title":"Decay towards the overall-healthy state in SIS epidemics on networks.","venue":"CoRR","volume":"abs/1310.3980","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mieghem13","ee":"http://arxiv.org/abs/1310.3980","url":"https://dblp.org/rec/journals/corr/Mieghem13"}, "url":"URL#4256145" }, { "@score":"1", "@id":"4256149", "info":{"authors":{"author":[{"@pid":"63/4545","text":"Zarko Mijajlovic"},{"@pid":"15/750","text":"Aleksandar Pejovic"}]},"title":"Computing finite models using free Boolean generators.","venue":"CoRR","volume":"abs/1310.6978","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MijajlovicP13","ee":"http://arxiv.org/abs/1310.6978","url":"https://dblp.org/rec/journals/corr/MijajlovicP13"}, "url":"URL#4256149" }, { "@score":"1", "@id":"4256152", "info":{"authors":{"author":[{"@pid":"45/8055","text":"Tomás Mikolov"},{"@pid":"60/5276","text":"Ilya Sutskever"},{"@pid":"c/KaiChen10","text":"Kai Chen 0010"},{"@pid":"05/8414","text":"Greg Corrado"},{"@pid":"d/JeffreyDean","text":"Jeffrey Dean"}]},"title":"Distributed Representations of Words and Phrases and their Compositionality.","venue":"CoRR","volume":"abs/1310.4546","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MikolovSCCD13","ee":"http://arxiv.org/abs/1310.4546","url":"https://dblp.org/rec/journals/corr/MikolovSCCD13"}, "url":"URL#4256152" }, { "@score":"1", "@id":"4256170", "info":{"authors":{"author":[{"@pid":"38/3171","text":"Trang Cao Minh"},{"@pid":"35/6267","text":"Boris Bellalta"},{"@pid":"69/5146","text":"Simon Oechsner"},{"@pid":"40/8436-2","text":"Ruizhi Liao 0002"},{"@pid":"87/4550","text":"Miquel Oliver"}]},"title":"Managing Heterogeneous WSNs in Smart Cities: Challenges and Requirements.","venue":"CoRR","volume":"abs/1310.6901","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MinhBOLO13","ee":"http://arxiv.org/abs/1310.6901","url":"https://dblp.org/rec/journals/corr/MinhBOLO13"}, "url":"URL#4256170" }, { "@score":"1", "@id":"4256173", "info":{"authors":{"author":{"@pid":"11/3011","text":"Matteo Mio"}},"title":"Upper-Expectation Bisimilarity and Real-valued Modal Logics.","venue":"CoRR","volume":"abs/1310.0768","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mio13","ee":"http://arxiv.org/abs/1310.0768","url":"https://dblp.org/rec/journals/corr/Mio13"}, "url":"URL#4256173" }, { "@score":"1", "@id":"4256196", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"Inventions on reducing keyboard size: A TRIZ based analysis.","venue":"CoRR","volume":"abs/1310.3070","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13n","ee":"http://arxiv.org/abs/1310.3070","url":"https://dblp.org/rec/journals/corr/Mishra13n"}, "url":"URL#4256196" }, { "@score":"1", "@id":"4256197", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"Keyboard for inputting Chinese language.","venue":"CoRR","volume":"abs/1310.3111","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13o","ee":"http://arxiv.org/abs/1310.3111","url":"https://dblp.org/rec/journals/corr/Mishra13o"}, "url":"URL#4256197" }, { "@score":"1", "@id":"4256198", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"Keyboards for inputting Japanese language -A study based on US patents.","venue":"CoRR","volume":"abs/1310.3115","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13p","ee":"http://arxiv.org/abs/1310.3115","url":"https://dblp.org/rec/journals/corr/Mishra13p"}, "url":"URL#4256198" }, { "@score":"1", "@id":"4256199", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on Keyboard Key Switch Mechanism.","venue":"CoRR","volume":"abs/1310.3140","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13q","ee":"http://arxiv.org/abs/1310.3140","url":"https://dblp.org/rec/journals/corr/Mishra13q"}, "url":"URL#4256199" }, { "@score":"1", "@id":"4256200", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on special type of keyboards -A study based on US patents.","venue":"CoRR","volume":"abs/1310.3145","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13r","ee":"http://arxiv.org/abs/1310.3145","url":"https://dblp.org/rec/journals/corr/Mishra13r"}, "url":"URL#4256200" }, { "@score":"1", "@id":"4256201", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on Key Guides and Keyboard Templates.","venue":"CoRR","volume":"abs/1310.3165","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13s","ee":"http://arxiv.org/abs/1310.3165","url":"https://dblp.org/rec/journals/corr/Mishra13s"}, "url":"URL#4256201" }, { "@score":"1", "@id":"4256202", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on collapsible keyboards: A TRIZ based analysis.","venue":"CoRR","volume":"abs/1310.3268","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13t","ee":"http://arxiv.org/abs/1310.3268","url":"https://dblp.org/rec/journals/corr/Mishra13t"}, "url":"URL#4256202" }, { "@score":"1", "@id":"4256203", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on laptop keyboards -A study based on US patents.","venue":"CoRR","volume":"abs/1310.3849","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13u","ee":"http://arxiv.org/abs/1310.3849","url":"https://dblp.org/rec/journals/corr/Mishra13u"}, "url":"URL#4256203" }, { "@score":"1", "@id":"4256204", "info":{"authors":{"author":{"@pid":"131/6525","text":"Umakant Mishra"}},"title":"10 Inventions on modular keyboards: A TRIZ based analysis.","venue":"CoRR","volume":"abs/1310.3850","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13v","ee":"http://arxiv.org/abs/1310.3850","url":"https://dblp.org/rec/journals/corr/Mishra13v"}, "url":"URL#4256204" }, { "@score":"1", "@id":"4256205", "info":{"authors":{"author":{"@pid":"78/10122","text":"Dheerendra Mishra"}},"title":"Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity.","venue":"CoRR","volume":"abs/1310.6422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mishra13w","ee":"http://arxiv.org/abs/1310.6422","url":"https://dblp.org/rec/journals/corr/Mishra13w"}, "url":"URL#4256205" }, { "@score":"1", "@id":"4256224", "info":{"authors":{"author":[{"@pid":"135/7376","text":"Rangeet Mitra"},{"@pid":"98/7479","text":"Amit Kumar Mishra"}]},"title":"Contraction Principle based Robust Iterative Algorithms for Machine Learning.","venue":"CoRR","volume":"abs/1310.1518","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MitraM13","ee":"http://arxiv.org/abs/1310.1518","url":"https://dblp.org/rec/journals/corr/MitraM13"}, "url":"URL#4256224" }, { "@score":"1", "@id":"4256228", "info":{"authors":{"author":[{"@pid":"72/873","text":"Pece Mitrevski"},{"@pid":"135/6264","text":"Olivera Kostoska"},{"@pid":"136/5806","text":"Marjan Angeleski"}]},"title":"E-Business Implications for Productivity and Competitiveness.","venue":"CoRR","volume":"abs/1310.7962","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MitrevskiKA13","ee":"http://arxiv.org/abs/1310.7962","url":"https://dblp.org/rec/journals/corr/MitrevskiKA13"}, "url":"URL#4256228" }, { "@score":"1", "@id":"4256233", "info":{"authors":{"author":{"@pid":"97/9523","text":"Sparsh Mittal"}},"title":"Dynamic cache reconfiguration based techniques for improving cache energy efficiency.","venue":"CoRR","volume":"abs/1310.4231","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mittal13c","ee":"http://arxiv.org/abs/1310.4231","url":"https://dblp.org/rec/journals/corr/Mittal13c"}, "url":"URL#4256233" }, { "@score":"1", "@id":"4256234", "info":{"authors":{"author":{"@pid":"97/9523","text":"Sparsh Mittal"}},"title":"Using Cache-coloring to Mitigate Inter-set Write Variation in Non-volatile Caches.","venue":"CoRR","volume":"abs/1310.8494","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mittal13d","ee":"http://arxiv.org/abs/1310.8494","url":"https://dblp.org/rec/journals/corr/Mittal13d"}, "url":"URL#4256234" }, { "@score":"1", "@id":"4256244", "info":{"authors":{"author":[{"@pid":"136/5974-1","text":"Atsushi Miyauchi 0001"},{"@pid":"136/6175","text":"Noriyoshi Sukegawa"}]},"title":"Maximizing Barber's bipartite modularity is also hard.","venue":"CoRR","volume":"abs/1310.4656","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MiyauchiS13","ee":"http://arxiv.org/abs/1310.4656","url":"https://dblp.org/rec/journals/corr/MiyauchiS13"}, "url":"URL#4256244" }, { "@score":"1", "@id":"4256254", "info":{"authors":{"author":[{"@pid":"122/5306","text":"Andrea Modenini"},{"@pid":"14/875","text":"Fredrik Rusek"},{"@pid":"c/GiulioColavolpe","text":"Giulio Colavolpe"}]},"title":"Optimal Transmit Filters for ISI Channels under Channel Shortening Detection.","venue":"CoRR","volume":"abs/1310.6265","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ModeniniRC13","ee":"http://arxiv.org/abs/1310.6265","url":"https://dblp.org/rec/journals/corr/ModeniniRC13"}, "url":"URL#4256254" }, { "@score":"1", "@id":"4256262", "info":{"authors":{"author":[{"@pid":"136/6130","text":"Manar Mohamed"},{"@pid":"119/0385","text":"Niharika Sachdeva"},{"@pid":"136/5773","text":"Michael Georgescu"},{"@pid":"92/357-10","text":"Song Gao 0010"},{"@pid":"25/1169","text":"Nitesh Saxena"},{"@pid":"07/2693","text":"Chengcui Zhang"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"},{"@pid":"o/PCvOorschot","text":"Paul C. van Oorschot"},{"@pid":"43/2445","text":"Wei-bang Chen"}]},"title":"Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.","venue":"CoRR","volume":"abs/1310.1540","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohamedSGGSZKOC13","ee":"http://arxiv.org/abs/1310.1540","url":"https://dblp.org/rec/journals/corr/MohamedSGGSZKOC13"}, "url":"URL#4256262" }, { "@score":"1", "@id":"4256281", "info":{"authors":{"author":[{"@pid":"03/5448","text":"Mehryar Mohri"},{"@pid":"10/11472","text":"Andres Muñoz Medina"}]},"title":"Learning Theory and Algorithms for Revenue Optimization in Second-Price Auctions with Reserve.","venue":"CoRR","volume":"abs/1310.5665","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohriM13","ee":"http://arxiv.org/abs/1310.5665","url":"https://dblp.org/rec/journals/corr/MohriM13"}, "url":"URL#4256281" }, { "@score":"1", "@id":"4256319", "info":{"authors":{"author":[{"@pid":"85/9143","text":"Gildas Morvan"},{"@pid":"97/9143","text":"Alexandre Veremme"},{"@pid":"83/9143","text":"Daniel Dupont"}]},"title":"IRM4MLS: the influence reaction model for multi-level simulation.","venue":"CoRR","volume":"abs/1310.7951","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MorvanVD13","ee":"http://arxiv.org/abs/1310.7951","url":"https://dblp.org/rec/journals/corr/MorvanVD13"}, "url":"URL#4256319" }, { "@score":"1", "@id":"4256324", "info":{"authors":{"author":{"@pid":"63/8397","text":"Milán Mosonyi"}},"title":"Renyi divergences and the classical capacity of finite compound channels.","venue":"CoRR","volume":"abs/1310.7525","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mosonyi13","ee":"http://arxiv.org/abs/1310.7525","url":"https://dblp.org/rec/journals/corr/Mosonyi13"}, "url":"URL#4256324" }, { "@score":"1", "@id":"4256332", "info":{"authors":{"author":[{"@pid":"136/5861","text":"Naoual Mouhni"},{"@pid":"136/6036","text":"Abderrafiaa Elkalay"}]},"title":"Ontology based data warehouses federation management system.","venue":"CoRR","volume":"abs/1310.5841","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MouhniE13","ee":"http://arxiv.org/abs/1310.5841","url":"https://dblp.org/rec/journals/corr/MouhniE13"}, "url":"URL#4256332" }, { "@score":"1", "@id":"4256363", "info":{"authors":{"author":[{"@pid":"136/5821","text":"Arko Provo Mukherjee"},{"@pid":"11/9718-1","text":"Pan Xu 0001"},{"@pid":"40/3710","text":"Srikanta Tirthapura"}]},"title":"Mining Maximal Cliques from an Uncertain Graph.","venue":"CoRR","volume":"abs/1310.6780","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MukherjeeXT13","ee":"http://arxiv.org/abs/1310.6780","url":"https://dblp.org/rec/journals/corr/MukherjeeXT13"}, "url":"URL#4256363" }, { "@score":"1", "@id":"4256372", "info":{"authors":{"author":[{"@pid":"136/6012","text":"Snehal Mulay"},{"@pid":"136/6117","text":"Chinmay Dhekne"},{"@pid":"136/5638","text":"Rucha Bapat"},{"@pid":"136/6112","text":"Tanmay Budukh"},{"@pid":"136/5972","text":"Soham Gadgil"}]},"title":"Intelligent City Traffic Management and Public Transportation System.","venue":"CoRR","volume":"abs/1310.5793","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MulayDBBG13","ee":"http://arxiv.org/abs/1310.5793","url":"https://dblp.org/rec/journals/corr/MulayDBBG13"}, "url":"URL#4256372" }, { "@score":"1", "@id":"4256376", "info":{"authors":{"author":[{"@pid":"29/103","text":"Ralf R. Müller"},{"@pid":"57/120","text":"Giusi Alfano"},{"@pid":"82/6938","text":"Benjamin M. Zaidel"},{"@pid":"90/3272","text":"Rodrigo de Miguel"}]},"title":"Applications of Large Random Matrices in Communications Engineering.","venue":"CoRR","volume":"abs/1310.5479","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MullerAZM13","ee":"http://arxiv.org/abs/1310.5479","url":"https://dblp.org/rec/journals/corr/MullerAZM13"}, "url":"URL#4256376" }, { "@score":"1", "@id":"4256378", "info":{"authors":{"author":[{"@pid":"117/5417-1","text":"Axel Müller 0001"},{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Linear Precoding Based on Truncated Polynomial Expansion - Part I: Large-Scale Single-Cell Systems.","venue":"CoRR","volume":"abs/1310.1806","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MullerKBD13","ee":"http://arxiv.org/abs/1310.1806","url":"https://dblp.org/rec/journals/corr/MullerKBD13"}, "url":"URL#4256378" }, { "@score":"1", "@id":"4256388", "info":{"authors":{"author":[{"@pid":"81/7984","text":"Vidya N. Murali"},{"@pid":"90/7984","text":"Anthony Threatt"},{"@pid":"121/0002","text":"Joe Manganelli"},{"@pid":"71/8368","text":"Paul Yanik"},{"@pid":"77/7984","text":"Sumod K. Mohan"},{"@pid":"59/7985","text":"Akshay Apte"},{"@pid":"136/5909","text":"Raghavendran Ramachandran"},{"@pid":"63/3497","text":"Linnea Smolentzov"},{"@pid":"69/5523","text":"Johnell O. Brooks"},{"@pid":"94/5368","text":"Ian D. Walker"},{"@pid":"70/2770","text":"Keith E. Green"}]},"title":"A Mobile Robotic Personal Nightstand with Integrated Perceptual Processes.","venue":"CoRR","volume":"abs/1310.4168","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MuraliTMYMARSBWG13","ee":"http://arxiv.org/abs/1310.4168","url":"https://dblp.org/rec/journals/corr/MuraliTMYMARSBWG13"}, "url":"URL#4256388" }, { "@score":"1", "@id":"4256400", "info":{"authors":{"author":[{"@pid":"132/4930","text":"Mario Mustra"},{"@pid":"88/6709","text":"Mislav Grgic"}]},"title":"Filtering for More Accurate Dense Tissue Segmentation in Digitized Mammograms.","venue":"CoRR","volume":"abs/1310.0305","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MustraG13","ee":"http://arxiv.org/abs/1310.0305","url":"https://dblp.org/rec/journals/corr/MustraG13"}, "url":"URL#4256400" }, { "@score":"1", "@id":"4256402", "info":{"authors":{"author":[{"@pid":"47/2636","text":"Alexei G. Myasnikov"},{"@pid":"01/10547","text":"Andrey Nikolaev"},{"@pid":"69/5394","text":"Alexander Ushakov"}]},"title":"The Post correspondence problem in groups.","venue":"CoRR","volume":"abs/1310.5246","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/MyasnikovNU13","ee":"http://arxiv.org/abs/1310.5246","url":"https://dblp.org/rec/journals/corr/MyasnikovNU13"}, "url":"URL#4256402" }, { "@score":"1", "@id":"4256441", "info":{"authors":{"author":[{"@pid":"76/6602","text":"Tamás Nagy"},{"@pid":"46/7999","text":"Zoltan Gingl"}]},"title":"Low-cost photoplethysmograph solutions using the Raspberry Pi.","venue":"CoRR","volume":"abs/1310.2717","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NagyG13","ee":"http://arxiv.org/abs/1310.2717","url":"https://dblp.org/rec/journals/corr/NagyG13"}, "url":"URL#4256441" }, { "@score":"1", "@id":"4256442", "info":{"authors":{"author":[{"@pid":"99/11346","text":"Marcin Nagy"},{"@pid":"39/5944","text":"Varun Singh"},{"@pid":"57/6706","text":"Jörg Ott"},{"@pid":"71/1693","text":"Lars Eggert"}]},"title":"Congestion Control using FEC for Conversational Multimedia Communication.","venue":"CoRR","volume":"abs/1310.1582","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NagySOE13","ee":"http://arxiv.org/abs/1310.1582","url":"https://dblp.org/rec/journals/corr/NagySOE13"}, "url":"URL#4256442" }, { "@score":"1", "@id":"4256445", "info":{"authors":{"author":[{"@pid":"136/6116","text":"Gaurang Naik"},{"@pid":"136/5937","text":"Sudesh Singhal"},{"@pid":"90/1994","text":"Animesh Kumar"},{"@pid":"49/5720","text":"Abhay Karandikar"}]},"title":"Quantitative Assessment of TV White Space in India.","venue":"CoRR","volume":"abs/1310.8540","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaikSKK13","ee":"http://arxiv.org/abs/1310.8540","url":"https://dblp.org/rec/journals/corr/NaikSKK13"}, "url":"URL#4256445" }, { "@score":"1", "@id":"4256450", "info":{"authors":{"author":[{"@pid":"136/5720","text":"Yashar Najaflou"},{"@pid":"05/7993","text":"Behrouz Jedari"},{"@pid":"62/3147","text":"Feng Xia 0001"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence T. Yang"},{"@pid":"91/2882","text":"Mohammad S. Obaidat"}]},"title":"Safety Challenges and Solutions in Mobile Social Networks.","venue":"CoRR","volume":"abs/1310.5949","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NajaflouJXYO13","ee":"http://arxiv.org/abs/1310.5949","url":"https://dblp.org/rec/journals/corr/NajaflouJXYO13"}, "url":"URL#4256450" }, { "@score":"1", "@id":"4256464", "info":{"authors":{"author":[{"@pid":"44/8052","text":"Sunil K. Narang"},{"@pid":"127/7320","text":"Akshay Gadde"},{"@pid":"136/6101","text":"Eduard Sanou"},{"@pid":"o/AntonioOrtega","text":"Antonio Ortega"}]},"title":"Localized Iterative Methods for Interpolation in Graph Structured Data.","venue":"CoRR","volume":"abs/1310.2646","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NarangGSO13","ee":"http://arxiv.org/abs/1310.2646","url":"https://dblp.org/rec/journals/corr/NarangGSO13"}, "url":"URL#4256464" }, { "@score":"1", "@id":"4256465", "info":{"authors":{"author":[{"@pid":"119/9283","text":"T. Lakshmi Narasimhan"},{"@pid":"65/6366","text":"A. Chockalingam"}]},"title":"Channel Hardening-Exploiting Message Passing (CHEMP) Receiver in Large-Scale MIMO Systems.","venue":"CoRR","volume":"abs/1310.3062","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NarasimhanC13","ee":"http://arxiv.org/abs/1310.3062","url":"https://dblp.org/rec/journals/corr/NarasimhanC13"}, "url":"URL#4256465" }, { "@score":"1", "@id":"4256466", "info":{"authors":{"author":[{"@pid":"119/9283","text":"T. Lakshmi Narasimhan"},{"@pid":"65/6366","text":"A. Chockalingam"}]},"title":"M-ary Detection and q-ary Decoding in Large-Scale MIMO: A Non-Binary Belief Propagation Approach.","venue":"CoRR","volume":"abs/1310.4347","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NarasimhanC13a","ee":"http://arxiv.org/abs/1310.4347","url":"https://dblp.org/rec/journals/corr/NarasimhanC13a"}, "url":"URL#4256466" }, { "@score":"1", "@id":"4256473", "info":{"authors":{"author":[{"@pid":"60/9874","text":"Ali Arshad Nasir"},{"@pid":"36/2064","text":"Xiangyun Zhou 0001"},{"@pid":"77/6860","text":"Salman Durrani"},{"@pid":"56/6217","text":"Rodney A. Kennedy"}]},"title":"Wireless Energy Harvesting and Information Relaying: Adaptive Time-Switching Protocols and Throughput Analysis.","venue":"CoRR","volume":"abs/1310.7648","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NasirZDK13","ee":"http://arxiv.org/abs/1310.7648","url":"https://dblp.org/rec/journals/corr/NasirZDK13"}, "url":"URL#4256473" }, { "@score":"1", "@id":"4256474", "info":{"authors":{"author":{"@pid":"23/10123","text":"Mohammad Nasiruddin"}},"title":"A State of the Art of Word Sense Induction: A Way Towards Word Sense Disambiguation for Under-Resourced Languages.","venue":"CoRR","volume":"abs/1310.1425","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nasiruddin13","ee":"http://arxiv.org/abs/1310.1425","url":"https://dblp.org/rec/journals/corr/Nasiruddin13"}, "url":"URL#4256474" }, { "@score":"1", "@id":"4256482", "info":{"authors":{"author":[{"@pid":"84/281","text":"Pavel Naumov"},{"@pid":"07/9874","text":"Brittany Nicholls"}]},"title":"R.E. Axiomatization of Conditional Independence.","venue":"CoRR","volume":"abs/1310.6430","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NaumovN13","ee":"http://arxiv.org/abs/1310.6430","url":"https://dblp.org/rec/journals/corr/NaumovN13"}, "url":"URL#4256482" }, { "@score":"1", "@id":"4256496", "info":{"authors":{"author":[{"@pid":"03/2691","text":"Deanna Needell"},{"@pid":"50/3633","text":"Nathan Srebro"},{"@pid":"186/8191","text":"Rachel A. Ward"}]},"title":"Stochastic gradient descent and the randomized Kaczmarz algorithm.","venue":"CoRR","volume":"abs/1310.5715","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NeedellSW13","ee":"http://arxiv.org/abs/1310.5715","url":"https://dblp.org/rec/journals/corr/NeedellSW13"}, "url":"URL#4256496" }, { "@score":"1", "@id":"4256497", "info":{"authors":{"author":{"@pid":"n/MichaelJNeely","text":"Michael J. Neely"}},"title":"A Lyapunov Optimization Approach to Repeated Stochastic Games.","venue":"CoRR","volume":"abs/1310.2648","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Neely13","ee":"http://arxiv.org/abs/1310.2648","url":"https://dblp.org/rec/journals/corr/Neely13"}, "url":"URL#4256497" }, { "@score":"1", "@id":"4256504", "info":{"authors":{"author":[{"@pid":"136/5936","text":"Elena Nenova"},{"@pid":"21/5524","text":"Dmitry I. Ignatov"},{"@pid":"118/9554","text":"Andrey V. Konstantinov"}]},"title":"An FCA-based Boolean Matrix Factorisation for Collaborative Filtering.","venue":"CoRR","volume":"abs/1310.4366","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NenovaIK13","ee":"http://arxiv.org/abs/1310.4366","url":"https://dblp.org/rec/journals/corr/NenovaIK13"}, "url":"URL#4256504" }, { "@score":"1", "@id":"4256508", "info":{"authors":{"author":[{"@pid":"136/6176","text":"Alessandro Nesti"},{"@pid":"136/5920","text":"Karl A. Beykirch"},{"@pid":"37/3547","text":"Paul R. MacNeilage"},{"@pid":"136/5933","text":"Michael Barnett-Cowan"},{"@pid":"75/790","text":"Heinrich H. Bülthoff"}]},"title":"The importance of stimulus noise analysis for self-motion studies.","venue":"CoRR","volume":"abs/1310.0312","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NestiBMBB13","ee":"http://arxiv.org/abs/1310.0312","url":"https://dblp.org/rec/journals/corr/NestiBMBB13"}, "url":"URL#4256508" }, { "@score":"1", "@id":"4256522", "info":{"authors":{"author":{"@pid":"n/MEJNewman","text":"M. E. J. Newman"}},"title":"Prediction of highly cited papers.","venue":"CoRR","volume":"abs/1310.8220","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Newman13b","ee":"http://arxiv.org/abs/1310.8220","url":"https://dblp.org/rec/journals/corr/Newman13b"}, "url":"URL#4256522" }, { "@score":"1", "@id":"4256533", "info":{"authors":{"author":[{"@pid":"60/4037","text":"Hien Quoc Ngo"},{"@pid":"76/3752","text":"Erik G. Larsson"},{"@pid":"84/6779","text":"Thomas L. Marzetta"}]},"title":"Massive MU-MIMO Downlink TDD Systems with Linear Precoding and Downlink Pilots.","venue":"CoRR","volume":"abs/1310.1510","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NgoLM13","ee":"http://arxiv.org/abs/1310.1510","url":"https://dblp.org/rec/journals/corr/NgoLM13"}, "url":"URL#4256533" }, { "@score":"1", "@id":"4256534", "info":{"authors":{"author":[{"@pid":"n/HungQNgo","text":"Hung Q. Ngo 0001"},{"@pid":"r/ChristopherRe","text":"Christopher Ré"},{"@pid":"04/4980","text":"Atri Rudra"}]},"title":"Skew Strikes Back: New Developments in the Theory of Join Algorithms.","venue":"CoRR","volume":"abs/1310.3314","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NgoRR13","ee":"http://arxiv.org/abs/1310.3314","url":"https://dblp.org/rec/journals/corr/NgoRR13"}, "url":"URL#4256534" }, { "@score":"1", "@id":"4256535", "info":{"authors":{"author":[{"@pid":"40/11142","text":"Hung Nguyen-Xuan"},{"@pid":"136/5650","text":"Loc V. Tran"},{"@pid":"136/5695","text":"Chien H. Thai"},{"@pid":"136/5642","text":"S. Kulasegaram"},{"@pid":"51/6157","text":"Stéphane P. A. Bordas"}]},"title":"Isogeometric finite element analysis of functionally graded plates using a refined plate theory.","venue":"CoRR","volume":"abs/1310.1847","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nguyen-XuanTTKB13","ee":"http://arxiv.org/abs/1310.1847","url":"https://dblp.org/rec/journals/corr/Nguyen-XuanTTKB13"}, "url":"URL#4256535" }, { "@score":"1", "@id":"4256582", "info":{"authors":{"author":[{"@pid":"132/7812","text":"S. Nischal"},{"@pid":"64/6125","text":"Vinod Sharma"}]},"title":"A Joint Uplink/Downlink Opportunistic Scheduling Scheme for Infrastructure WLANs.","venue":"CoRR","volume":"abs/1310.5125","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NischalS13","ee":"http://arxiv.org/abs/1310.5125","url":"https://dblp.org/rec/journals/corr/NischalS13"}, "url":"URL#4256582" }, { "@score":"1", "@id":"4256588", "info":{"authors":{"author":[{"@pid":"23/9994","text":"Sarwat Nizamani"},{"@pid":"99/943","text":"Nasrullah Memon"},{"@pid":"86/4836","text":"Serge Galam"}]},"title":"From Public Outrage to the Burst of Public Violence: An Epidemic-Like Model.","venue":"CoRR","volume":"abs/1310.0731","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NizamaniMG13","ee":"http://arxiv.org/abs/1310.0731","url":"https://dblp.org/rec/journals/corr/NizamaniMG13"}, "url":"URL#4256588" }, { "@score":"1", "@id":"4256595", "info":{"authors":{"author":[{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"92/11335","text":"Karen C. Cheung"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"A Unifying Model for External Noise Sources and ISI in Diffusive Molecular Communication.","venue":"CoRR","volume":"abs/1310.5930","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/NoelCS13b","ee":"http://arxiv.org/abs/1310.5930","url":"https://dblp.org/rec/journals/corr/NoelCS13b"}, "url":"URL#4256595" }, { "@score":"1", "@id":"4256601", "info":{"authors":{"author":{"@pid":"83/4575","text":"Ryo Nomura"}},"title":"Overflow Probability of Variable-length Codes with Codeword Cost.","venue":"CoRR","volume":"abs/1310.2001","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nomura13","ee":"http://arxiv.org/abs/1310.2001","url":"https://dblp.org/rec/journals/corr/Nomura13"}, "url":"URL#4256601" }, { "@score":"1", "@id":"4256602", "info":{"authors":{"author":{"@pid":"48/230","text":"Rajeev C. Nongpiur"}},"title":"Impulse Noise Removal In Speech Using Wavelets.","venue":"CoRR","volume":"abs/1310.7447","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Nongpiur13","ee":"http://arxiv.org/abs/1310.7447","url":"https://dblp.org/rec/journals/corr/Nongpiur13"}, "url":"URL#4256602" }, { "@score":"1", "@id":"4256610", "info":{"authors":{"author":{"@pid":"40/3073","text":"Janis Nötzel"}},"title":"Hypothesis Testing on Invariant Subspaces of the Symmetric Group, Part I - Quantum Sanov's Theorem and Arbitrarily Varying Sources.","venue":"CoRR","volume":"abs/1310.5553","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Notzel13","ee":"http://arxiv.org/abs/1310.5553","url":"https://dblp.org/rec/journals/corr/Notzel13"}, "url":"URL#4256610" }, { "@score":"1", "@id":"4256627", "info":{"authors":{"author":[{"@pid":"10/1481","text":"Brendan O'Connor 0001"},{"@pid":"37/2741","text":"Michael Heilman"}]},"title":"ARKref: a rule-based coreference resolution system.","venue":"CoRR","volume":"abs/1310.1975","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OConnorH13","ee":"http://arxiv.org/abs/1310.1975","url":"https://dblp.org/rec/journals/corr/OConnorH13"}, "url":"URL#4256627" }, { "@score":"1", "@id":"4256649", "info":{"authors":{"author":{"@pid":"70/9650","text":"Tomoaki Okayama"}},"title":"Theoretical analysis of a Sinc-Nyström method for Volterra integro-differential equations and its improvement.","venue":"CoRR","volume":"abs/1310.7708","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Okayama13a","ee":"http://arxiv.org/abs/1310.7708","url":"https://dblp.org/rec/journals/corr/Okayama13a"}, "url":"URL#4256649" }, { "@score":"1", "@id":"4256668", "info":{"authors":{"author":[{"@pid":"50/8779","text":"Olivier Mullier"},{"@pid":"90/1132","text":"Eric Goubault"},{"@pid":"41/1521","text":"Michel Kieffer"},{"@pid":"61/1269","text":"Sylvie Putot"}]},"title":"General inner approximation of vector-valued functions.","venue":"CoRR","volume":"abs/1310.1709","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OlivierGKP13","ee":"http://arxiv.org/abs/1310.1709","url":"https://dblp.org/rec/journals/corr/OlivierGKP13"}, "url":"URL#4256668" }, { "@score":"1", "@id":"4256671", "info":{"authors":{"author":[{"@pid":"132/2048","text":"Randal S. Olson"},{"@pid":"99/6145","text":"David B. Knoester"},{"@pid":"36/1930","text":"Christoph Adami"}]},"title":"Evolution of swarming behavior is shaped by how predators attack.","venue":"CoRR","volume":"abs/1310.6012","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OlsonKA13","ee":"http://arxiv.org/abs/1310.6012","url":"https://dblp.org/rec/journals/corr/OlsonKA13"}, "url":"URL#4256671" }, { "@score":"1", "@id":"4256682", "info":{"authors":{"author":[{"@pid":"80/3790","text":"Francesco Orabona"},{"@pid":"36/5041","text":"Tamir Hazan"},{"@pid":"32/4477","text":"Anand D. Sarwate"},{"@pid":"j/TommiJaakkola","text":"Tommi S. Jaakkola"}]},"title":"On Measure Concentration of Random Maximum A-Posteriori Perturbations.","venue":"CoRR","volume":"abs/1310.4227","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OrabonaHSJ13","ee":"http://arxiv.org/abs/1310.4227","url":"https://dblp.org/rec/journals/corr/OrabonaHSJ13"}, "url":"URL#4256682" }, { "@score":"1", "@id":"4256686", "info":{"authors":{"author":{"@pid":"41/9471","text":"Enrique Orduña-Malea"}},"title":"Aggregation of the web performance of internal university units as a method of quantitative analysis of a university system: the case of Spain.","venue":"CoRR","volume":"abs/1310.5814","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orduna-Malea13","ee":"http://arxiv.org/abs/1310.5814","url":"https://dblp.org/rec/journals/corr/Orduna-Malea13"}, "url":"URL#4256686" }, { "@score":"1", "@id":"4256687", "info":{"authors":{"author":[{"@pid":"41/9471","text":"Enrique Orduña-Malea"},{"@pid":"18/8508","text":"Emilio Delgado López-Cózar"}]},"title":"Google Scholar Metrics evolution: an analysis according to languages.","venue":"CoRR","volume":"abs/1310.6162","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orduna-MaleaL13","ee":"http://arxiv.org/abs/1310.6162","url":"https://dblp.org/rec/journals/corr/Orduna-MaleaL13"}, "url":"URL#4256687" }, { "@score":"1", "@id":"4256688", "info":{"authors":{"author":[{"@pid":"41/9471","text":"Enrique Orduña-Malea"},{"@pid":"128/4799","text":"José-Antonio Ontalba-Ruipérez"}]},"title":"Selective linking from social platforms to university websites: a case study of the Spanish academic system.","venue":"CoRR","volume":"abs/1310.5815","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orduna-MaleaO13","ee":"http://arxiv.org/abs/1310.5815","url":"https://dblp.org/rec/journals/corr/Orduna-MaleaO13"}, "url":"URL#4256688" }, { "@score":"1", "@id":"4256689", "info":{"authors":{"author":[{"@pid":"41/9471","text":"Enrique Orduña-Malea"},{"@pid":"128/4799","text":"José-Antonio Ontalba-Ruipérez"}]},"title":"Proposal for a multilevel university cybermetric analysis model.","venue":"CoRR","volume":"abs/1310.5816","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orduna-MaleaO13a","ee":"http://arxiv.org/abs/1310.5816","url":"https://dblp.org/rec/journals/corr/Orduna-MaleaO13a"}, "url":"URL#4256689" }, { "@score":"1", "@id":"4256690", "info":{"authors":{"author":[{"@pid":"41/9471","text":"Enrique Orduña-Malea"},{"@pid":"122/7728","text":"John J. Regazzi"}]},"title":"U.S. academic libraries: understanding their web presence and their relationship with economic indicators.","venue":"CoRR","volume":"abs/1310.5812","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Orduna-MaleaR13","ee":"http://arxiv.org/abs/1310.5812","url":"https://dblp.org/rec/journals/corr/Orduna-MaleaR13"}, "url":"URL#4256690" }, { "@score":"1", "@id":"4256706", "info":{"authors":{"author":{"@pid":"05/1769","text":"Akira Otsuki"}},"title":"Dynamic Extraction of Key Paper from the Cluster Using Variance Values of Cited Literature.","venue":"CoRR","volume":"abs/1310.4904","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Otsuki13","ee":"http://arxiv.org/abs/1310.4904","url":"https://dblp.org/rec/journals/corr/Otsuki13"}, "url":"URL#4256706" }, { "@score":"1", "@id":"4256707", "info":{"authors":{"author":[{"@pid":"05/1769","text":"Akira Otsuki"},{"@pid":"136/6162","text":"Masayoshi Kawamura"}]},"title":"GV-Index: Scientific Contribution Rating Index That Takes into Account the Growth Degree of Research Area and Variance Values of the Publication Year of Cited Paper.","venue":"CoRR","volume":"abs/1310.4900","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OtsukiK13","ee":"http://arxiv.org/abs/1310.4900","url":"https://dblp.org/rec/journals/corr/OtsukiK13"}, "url":"URL#4256707" }, { "@score":"1", "@id":"4256724", "info":{"authors":{"author":[{"@pid":"00/776","text":"Nilay V. Oza"},{"@pid":"62/3260","text":"Jürgen Münch"},{"@pid":"76/2275","text":"Juan Garbajosa"},{"@pid":"94/4875","text":"Agustín Yagüe"},{"@pid":"124/5200","text":"Eloy González Ortega"}]},"title":"Identifying Potential Risks and Benefits of Using Cloud in Distributed Software Development.","venue":"CoRR","volume":"abs/1310.6564","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OzaMGYO13","ee":"http://arxiv.org/abs/1310.6564","url":"https://dblp.org/rec/journals/corr/OzaMGYO13"}, "url":"URL#4256724" }, { "@score":"1", "@id":"4256726", "info":{"authors":{"author":[{"@pid":"119/2621","text":"Gozde Ozcan"},{"@pid":"54/5244","text":"Mustafa Cenk Gursoy"},{"@pid":"57/5692","text":"Sinan Gezici"}]},"title":"Error Rate Analysis of Cognitive Radio Transmissions with Imperfect Channel Sensing.","venue":"CoRR","volume":"abs/1310.1822","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/OzcanGG13","ee":"http://arxiv.org/abs/1310.1822","url":"https://dblp.org/rec/journals/corr/OzcanGG13"}, "url":"URL#4256726" }, { "@score":"1", "@id":"4256742", "info":{"authors":{"author":[{"@pid":"44/6208","text":"Eric Pacuit"},{"@pid":"64/7976","text":"Arthur Paul Pedersen"},{"@pid":"83/7011","text":"Jan-Willem Romeijn"}]},"title":"When is an Example a Counterexample?","venue":"CoRR","volume":"abs/1310.6432","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PacuitPR13","ee":"http://arxiv.org/abs/1310.6432","url":"https://dblp.org/rec/journals/corr/PacuitPR13"}, "url":"URL#4256742" }, { "@score":"1", "@id":"4256751", "info":{"authors":{"author":[{"@pid":"94/6172","text":"Sakrapee Paisitkriangkrai"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"v/AntonvandenHengel","text":"Anton van den Hengel"}]},"title":"Efficient pedestrian detection by directly optimize the partial area under the ROC curve.","venue":"CoRR","volume":"abs/1310.0900","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PaisitkriangkraiSH13a","ee":"http://arxiv.org/abs/1310.0900","url":"https://dblp.org/rec/journals/corr/PaisitkriangkraiSH13a"}, "url":"URL#4256751" }, { "@score":"1", "@id":"4256765", "info":{"authors":{"author":{"@pid":"56/6527","text":"Dömötör Pálvölgyi"}},"title":"Indecomposable coverings with unit discs.","venue":"CoRR","volume":"abs/1310.6900","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Palvolgyi13","ee":"http://arxiv.org/abs/1310.6900","url":"https://dblp.org/rec/journals/corr/Palvolgyi13"}, "url":"URL#4256765" }, { "@score":"1", "@id":"4256780", "info":{"authors":{"author":[{"@pid":"136/5840","text":"Chanda Panse"},{"@pid":"136/5903","text":"Manali Kshirsagar"}]},"title":"Survey on Modelling Methods Applicable to Gene Regulatory Network.","venue":"CoRR","volume":"abs/1310.2361","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PanseK13","ee":"http://arxiv.org/abs/1310.2361","url":"https://dblp.org/rec/journals/corr/PanseK13"}, "url":"URL#4256780" }, { "@score":"1", "@id":"4256783", "info":{"authors":{"author":[{"@pid":"95/2151","text":"Pier Stanislao Paolucci"},{"@pid":"70/1866","text":"Roberto Ammendola"},{"@pid":"32/8910","text":"Andrea Biagioni"},{"@pid":"98/8909","text":"Ottorino Frezza"},{"@pid":"65/8910","text":"Francesca Lo Cicero"},{"@pid":"20/6479","text":"Alessandro Lonardo"},{"@pid":"136/6056","text":"Elena Pastorelli"},{"@pid":"38/8909","text":"Francesco Simula"},{"@pid":"91/8909","text":"Laura Tosoratto"},{"@pid":"41/2564","text":"Piero Vicini"}]},"title":"Distributed simulation of polychronous and plastic spiking neural networks: strong and weak scaling of a representative mini-application benchmark executed on a small-scale commodity cluster.","venue":"CoRR","volume":"abs/1310.8478","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PaolucciABFCLPSTV13","ee":"http://arxiv.org/abs/1310.8478","url":"https://dblp.org/rec/journals/corr/PaolucciABFCLPSTV13"}, "url":"URL#4256783" }, { "@score":"1", "@id":"4256784", "info":{"authors":{"author":[{"@pid":"92/6742","text":"Antonis Papachristodoulou"},{"@pid":"36/2768-1","text":"James Anderson 0001"},{"@pid":"58/6019","text":"Giorgio Valmorbida"},{"@pid":"28/2145","text":"Stephen Prajna"},{"@pid":"48/185","text":"Pete Seiler 0001"},{"@pid":"09/456","text":"Pablo A. Parrilo"}]},"title":"SOSTOOLS Version 3.00 Sum of Squares Optimization Toolbox for MATLAB.","venue":"CoRR","volume":"abs/1310.4716","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PapachristodoulouAVPSP13","ee":"http://arxiv.org/abs/1310.4716","url":"https://dblp.org/rec/journals/corr/PapachristodoulouAVPSP13"}, "url":"URL#4256784" }, { "@score":"1", "@id":"4256786", "info":{"authors":{"author":[{"@pid":"96/10056","text":"Tivadar Papai"},{"@pid":"k/HenryAKautz","text":"Henry A. Kautz"},{"@pid":"00/3605","text":"Daniel Stefankovic"}]},"title":"Reasoning Under the Principle of Maximum Entropy for Modal Logics K45, KD45, and S5.","venue":"CoRR","volume":"abs/1310.6439","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PapaiKS13","ee":"http://arxiv.org/abs/1310.6439","url":"https://dblp.org/rec/journals/corr/PapaiKS13"}, "url":"URL#4256786" }, { "@score":"1", "@id":"4256787", "info":{"authors":{"author":[{"@pid":"26/8602","text":"Panagiotis Papaioannou"},{"@pid":"62/5047","text":"Lucia Russo"},{"@pid":"06/6886","text":"George Papaioannou"},{"@pid":"21/147","text":"Constantinos I. Siettos"}]},"title":"Can social microblogging be used to forecast intraday exchange rates?","venue":"CoRR","volume":"abs/1310.5306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PapaioannouRPS13","ee":"http://arxiv.org/abs/1310.5306","url":"https://dblp.org/rec/journals/corr/PapaioannouRPS13"}, "url":"URL#4256787" }, { "@score":"1", "@id":"4256788", "info":{"authors":{"author":{"@pid":"130/3843","text":"Sasa Paporovic"}},"title":"Impacting the bioscience progress by backporting software for Bio-Linux.","venue":"CoRR","volume":"abs/1310.1588","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Paporovic13","ee":"http://arxiv.org/abs/1310.1588","url":"https://dblp.org/rec/journals/corr/Paporovic13"}, "url":"URL#4256788" }, { "@score":"1", "@id":"4256791", "info":{"authors":{"author":[{"@pid":"36/8968","text":"Nikolaos Pappas 0001"},{"@pid":"90/3967","text":"Marios Kountouris"},{"@pid":"70/6453","text":"Anthony Ephremides"},{"@pid":"10/2454","text":"Apostolos Traganitis"}]},"title":"Relay-assisted Multiple Access with Full-duplex Multi-Packet Reception.","venue":"CoRR","volume":"abs/1310.2773","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PappasKET13a","ee":"http://arxiv.org/abs/1310.2773","url":"https://dblp.org/rec/journals/corr/PappasKET13a"}, "url":"URL#4256791" }, { "@score":"1", "@id":"4256796", "info":{"authors":{"author":[{"@pid":"42/8069","text":"K. Parand 0001"},{"@pid":"182/0370","text":"Sayyed-Ali Hossayni"},{"@pid":"34/10622","text":"J. A. Rad"}]},"title":"The application of the exact operational matrices for solving the Emden-Fowler equations, arising in astrophysics.","venue":"CoRR","volume":"abs/1310.1906","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParandHR13","ee":"http://arxiv.org/abs/1310.1906","url":"https://dblp.org/rec/journals/corr/ParandHR13"}, "url":"URL#4256796" }, { "@score":"1", "@id":"4256797", "info":{"authors":{"author":[{"@pid":"42/8069","text":"K. Parand 0001"},{"@pid":"136/5752","text":"Saeed Zafarvahedian"},{"@pid":"182/0370","text":"Sayyed-Ali Hossayni"}]},"title":"GPU-acceleration of parallel unconditionally stable group explicit finite difference method.","venue":"CoRR","volume":"abs/1310.3422","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParandZH13","ee":"http://arxiv.org/abs/1310.3422","url":"https://dblp.org/rec/journals/corr/ParandZH13"}, "url":"URL#4256797" }, { "@score":"1", "@id":"4256804", "info":{"authors":{"author":[{"@pid":"92/6473-1","text":"Jaehyun Park 0001"},{"@pid":"86/5737","text":"Bruno Clerckx"}]},"title":"Joint Wireless Information and Energy Transfer in a K-User MIMO Interference Channel.","venue":"CoRR","volume":"abs/1310.6870","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParkC13","ee":"http://arxiv.org/abs/1310.6870","url":"https://dblp.org/rec/journals/corr/ParkC13"}, "url":"URL#4256804" }, { "@score":"1", "@id":"4256805", "info":{"authors":{"author":[{"@pid":"136/5609","text":"Jihong Park"},{"@pid":"32/673","text":"Seong-Lyun Kim"}]},"title":"Content-Specific Broadcast Cellular Networks based on User Demand Prediction: A Revenue Perspective.","venue":"CoRR","volume":"abs/1310.4777","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParkK13","ee":"http://arxiv.org/abs/1310.4777","url":"https://dblp.org/rec/journals/corr/ParkK13"}, "url":"URL#4256805" }, { "@score":"1", "@id":"4256810", "info":{"authors":{"author":[{"@pid":"00/4652-2","text":"Il Memming Park"},{"@pid":"47/7824","text":"Sohan Seth"},{"@pid":"20/1119","text":"Steven Van Vaerenbergh"}]},"title":"Bayesian Extensions of Kernel Least Mean Squares.","venue":"CoRR","volume":"abs/1310.5347","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParkSV13","ee":"http://arxiv.org/abs/1310.5347","url":"https://dblp.org/rec/journals/corr/ParkSV13"}, "url":"URL#4256810" }, { "@score":"1", "@id":"4256813", "info":{"authors":{"author":[{"@pid":"31/11106","text":"Jason T. Parker"},{"@pid":"s/PhilipSchniter","text":"Philip Schniter"},{"@pid":"70/5301","text":"Volkan Cevher"}]},"title":"Bilinear Generalized Approximate Message Passing.","venue":"CoRR","volume":"abs/1310.2632","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ParkerSC13","ee":"http://arxiv.org/abs/1310.2632","url":"https://dblp.org/rec/journals/corr/ParkerSC13"}, "url":"URL#4256813" }, { "@score":"1", "@id":"4256815", "info":{"authors":{"author":[{"@pid":"136/6134","text":"Bahar Partov"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"},{"@pid":"42/2016","text":"Rouzbeh Razavi"}]},"title":"Utility Fair Optimisation of Antenna Tilt Angles in LTE Networks.","venue":"CoRR","volume":"abs/1310.1015","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PartovLR13","ee":"http://arxiv.org/abs/1310.1015","url":"https://dblp.org/rec/journals/corr/PartovLR13"}, "url":"URL#4256815" }, { "@score":"1", "@id":"4256823", "info":{"authors":{"author":[{"@pid":"136/5706","text":"Mohammad Qasim Pasta"},{"@pid":"222/6259","text":"Zohaib Md. Jan"},{"@pid":"02/360","text":"Arnaud Sallaberry"},{"@pid":"72/7497","text":"Faraz Zaidi"}]},"title":"Tunable and Growing Network Generation Model with Community Structures.","venue":"CoRR","volume":"abs/1310.8396","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PastaJSZ13","ee":"http://arxiv.org/abs/1310.8396","url":"https://dblp.org/rec/journals/corr/PastaJSZ13"}, "url":"URL#4256823" }, { "@score":"1", "@id":"4256836", "info":{"authors":{"author":[{"@pid":"136/5692","text":"Sujeet Patole"},{"@pid":"47/3668","text":"Murat Torlak"}]},"title":"Two Dimensional Array Imaging with Beam Steered Data.","venue":"CoRR","volume":"abs/1310.6719","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PatoleT13","ee":"http://arxiv.org/abs/1310.6719","url":"https://dblp.org/rec/journals/corr/PatoleT13"}, "url":"URL#4256836" }, { "@score":"1", "@id":"4256839", "info":{"authors":{"author":[{"@pid":"136/5945","text":"Christos Patsonakis"},{"@pid":"r/MRoussopoulos","text":"Mema Roussopoulos"}]},"title":"Asynchronous Rumour Spreading in Social and Signed Networks.","venue":"CoRR","volume":"abs/1310.6119","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PatsonakisR13","ee":"http://arxiv.org/abs/1310.6119","url":"https://dblp.org/rec/journals/corr/PatsonakisR13"}, "url":"URL#4256839" }, { "@score":"1", "@id":"4256840", "info":{"authors":{"author":[{"@pid":"96/1837","text":"Stacy Patterson"},{"@pid":"39/2286","text":"Bassam Bamieh"}]},"title":"Consensus and Coherence in Fractal Networks.","venue":"CoRR","volume":"abs/1310.2592","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PattersonB13","ee":"http://arxiv.org/abs/1310.2592","url":"https://dblp.org/rec/journals/corr/PattersonB13"}, "url":"URL#4256840" }, { "@score":"1", "@id":"4256842", "info":{"authors":{"author":[{"@pid":"136/5701","text":"Reshad Patuck"},{"@pid":"136/5901","text":"Julio Hernandez-Castro"}]},"title":"Steganography using the Extensible Messaging and Presence Protocol (XMPP).","venue":"CoRR","volume":"abs/1310.0524","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PatuckH13","ee":"http://arxiv.org/abs/1310.0524","url":"https://dblp.org/rec/journals/corr/PatuckH13"}, "url":"URL#4256842" }, { "@score":"1", "@id":"4256854", "info":{"authors":{"author":[{"@pid":"97/4355","text":"Sachar Paulus"},{"@pid":"24/5239","text":"Ute Riemann"}]},"title":"An approach for a business-driven cloudcompliance analysis covering public sector process improvement requirements.","venue":"CoRR","volume":"abs/1310.2832","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PaulusR13","ee":"http://arxiv.org/abs/1310.2832","url":"https://dblp.org/rec/journals/corr/PaulusR13"}, "url":"URL#4256854" }, { "@score":"1", "@id":"4256856", "info":{"authors":{"author":{"@pid":"120/7459","text":"Bohdan M. Pavlyshenko"}},"title":"Forecasting of Events by Tweet Data Mining.","venue":"CoRR","volume":"abs/1310.3499","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Pavlyshenko13","ee":"http://arxiv.org/abs/1310.3499","url":"https://dblp.org/rec/journals/corr/Pavlyshenko13"}, "url":"URL#4256856" }, { "@score":"1", "@id":"4256857", "info":{"authors":{"author":{"@pid":"120/7459","text":"Bohdan M. Pavlyshenko"}},"title":"Can Twitter Predict Royal Baby's Name ?","venue":"CoRR","volume":"abs/1310.3500","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Pavlyshenko13a","ee":"http://arxiv.org/abs/1310.3500","url":"https://dblp.org/rec/journals/corr/Pavlyshenko13a"}, "url":"URL#4256857" }, { "@score":"1", "@id":"4256864", "info":{"authors":{"author":[{"@pid":"74/10758","text":"Mariano Martinez Peck"},{"@pid":"00/2598","text":"Noury Bouraqadi"},{"@pid":"d/SDucasse","text":"Stéphane Ducasse"},{"@pid":"46/6357","text":"Luc Fabresse"},{"@pid":"58/4781","text":"Marcus Denker"}]},"title":"Ghost: A Uniform and General-Purpose Proxy Implementation.","venue":"CoRR","volume":"abs/1310.7774","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeckBDFD13","ee":"http://arxiv.org/abs/1310.7774","url":"https://dblp.org/rec/journals/corr/PeckBDFD13"}, "url":"URL#4256864" }, { "@score":"1", "@id":"4256870", "info":{"authors":{"author":[{"@pid":"40/6706","text":"Tao Pei"},{"@pid":"133/8494","text":"Stanislav Sobolevsky"},{"@pid":"00/5561","text":"Carlo Ratti"},{"@pid":"45/3154","text":"Shih-Lung Shaw"},{"@pid":"85/1324","text":"Chenghu Zhou"}]},"title":"A New Insight into Land Use Classification Based on Aggregated Mobile Phone Data.","venue":"CoRR","volume":"abs/1310.6129","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeiSRSZ13","ee":"http://arxiv.org/abs/1310.6129","url":"https://dblp.org/rec/journals/corr/PeiSRSZ13"}, "url":"URL#4256870" }, { "@score":"1", "@id":"4256871", "info":{"authors":{"author":{"@pid":"36/8909","text":"Tiago P. Peixoto"}},"title":"Hierarchical block structures and high-resolution model selection in large networks.","venue":"CoRR","volume":"abs/1310.4377","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Peixoto13","ee":"http://arxiv.org/abs/1310.4377","url":"https://dblp.org/rec/journals/corr/Peixoto13"}, "url":"URL#4256871" }, { "@score":"1", "@id":"4256872", "info":{"authors":{"author":{"@pid":"36/8909","text":"Tiago P. Peixoto"}},"title":"Efficient Monte Carlo and greedy heuristic for the inference of stochastic block models.","venue":"CoRR","volume":"abs/1310.4378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Peixoto13a","ee":"http://arxiv.org/abs/1310.4378","url":"https://dblp.org/rec/journals/corr/Peixoto13a"}, "url":"URL#4256872" }, { "@score":"1", "@id":"4256884", "info":{"authors":{"author":[{"@pid":"136/5949","text":"Johan Pensar"},{"@pid":"131/6489","text":"Henrik J. Nyman"},{"@pid":"43/955","text":"Timo Koski"},{"@pid":"94/2872","text":"Jukka Corander"}]},"title":"Labeled Directed Acyclic Graphs: a generalization of context-specific independence in directed graphical models.","venue":"CoRR","volume":"abs/1310.1187","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PensarNKC13","ee":"http://arxiv.org/abs/1310.1187","url":"https://dblp.org/rec/journals/corr/PensarNKC13"}, "url":"URL#4256884" }, { "@score":"1", "@id":"4256892", "info":{"authors":{"author":[{"@pid":"115/6940","text":"Charith Perera"},{"@pid":"63/5509","text":"Prem Prakash Jayaraman"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"},{"@pid":"c/PeterChristen","text":"Peter Christen"},{"@pid":"82/2760","text":"Dimitrios Georgakopoulos 0001"}]},"title":"MOSDEN: An Internet of Things Middleware for Resource Constrained Mobile Devices.","venue":"CoRR","volume":"abs/1310.4038","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PereraJZCG13","ee":"http://arxiv.org/abs/1310.4038","url":"https://dblp.org/rec/journals/corr/PereraJZCG13"}, "url":"URL#4256892" }, { "@score":"1", "@id":"4256909", "info":{"authors":{"author":[{"@pid":"136/5881","text":"Thomas K. D. M. Peron"},{"@pid":"25/1781","text":"Peng Ji"},{"@pid":"25/11141","text":"Francisco Aparecido Rodrigues"},{"@pid":"32/3199","text":"Jürgen Kurths"}]},"title":"Impact of order three cycles in complex network spectra.","venue":"CoRR","volume":"abs/1310.3389","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PeronJRK13","ee":"http://arxiv.org/abs/1310.3389","url":"https://dblp.org/rec/journals/corr/PeronJRK13"}, "url":"URL#4256909" }, { "@score":"1", "@id":"4256917", "info":{"authors":{"author":[{"@pid":"136/5702","text":"Wim Pessemier"},{"@pid":"136/5907","text":"Gert Raskin"},{"@pid":"136/5641","text":"Hans Van Winckel"},{"@pid":"d/GeertDeconinck","text":"Geert Deconinck"},{"@pid":"136/6113","text":"Philippe Saey"}]},"title":"A practical approach to ontology-enabled control systems for astronomical instrumentation.","venue":"CoRR","volume":"abs/1310.5488","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PessemierRWDS13","ee":"http://arxiv.org/abs/1310.5488","url":"https://dblp.org/rec/journals/corr/PessemierRWDS13"}, "url":"URL#4256917" }, { "@score":"1", "@id":"4256921", "info":{"authors":{"author":{"@pid":"p/HolgerPetersen","text":"Holger Petersen 0001"}},"title":"A Note on Asynchronous PC Systems of Pushdown Automata (Preliminary Report).","venue":"CoRR","volume":"abs/1310.0504","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Petersen13c","ee":"http://arxiv.org/abs/1310.0504","url":"https://dblp.org/rec/journals/corr/Petersen13c"}, "url":"URL#4256921" }, { "@score":"1", "@id":"4256922", "info":{"authors":{"author":{"@pid":"p/HolgerPetersen","text":"Holger Petersen 0001"}},"title":"Some Remarks on Lower Bounds for Queues Machines (Preliminary Report).","venue":"CoRR","volume":"abs/1310.6398","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Petersen13d","ee":"http://arxiv.org/abs/1310.6398","url":"https://dblp.org/rec/journals/corr/Petersen13d"}, "url":"URL#4256922" }, { "@score":"1", "@id":"4256926", "info":{"authors":{"author":[{"@pid":"49/9221","text":"Tomislav Petkovic"},{"@pid":"136/6025","text":"Darko Juric"},{"@pid":"l/SvenLoncaric","text":"Sven Loncaric"}]},"title":"Flexible Visual Quality Inspection in Discrete Manufacturing.","venue":"CoRR","volume":"abs/1310.0306","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PetkovicJL13","ee":"http://arxiv.org/abs/1310.0306","url":"https://dblp.org/rec/journals/corr/PetkovicJL13"}, "url":"URL#4256926" }, { "@score":"1", "@id":"4256945", "info":{"authors":{"author":{"@pid":"65/6306","text":"Willy Picard"}},"title":"Simulating the Influence of Collaborative Networks on the Structure of Networks of Organizations, Employment Structure, and Organization Value.","venue":"CoRR","volume":"abs/1310.6516","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Picard13","ee":"http://arxiv.org/abs/1310.6516","url":"https://dblp.org/rec/journals/corr/Picard13"}, "url":"URL#4256945" }, { "@score":"1", "@id":"4256947", "info":{"authors":{"author":[{"@pid":"73/3623","text":"Karim Pichara"},{"@pid":"65/1070","text":"Pavlos Protopapas"}]},"title":"Automatic Classification of Variable Stars in Catalogs with missing data.","venue":"CoRR","volume":"abs/1310.7868","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PicharaP13","ee":"http://arxiv.org/abs/1310.7868","url":"https://dblp.org/rec/journals/corr/PicharaP13"}, "url":"URL#4256947" }, { "@score":"1", "@id":"4256948", "info":{"authors":{"author":[{"@pid":"12/2314","text":"Marc Pickett"},{"@pid":"25/557","text":"David W. Aha"}]},"title":"Spontaneous Analogy by Piggybacking on a Perceptual System.","venue":"CoRR","volume":"abs/1310.2955","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PickettA13","ee":"http://arxiv.org/abs/1310.2955","url":"https://dblp.org/rec/journals/corr/PickettA13"}, "url":"URL#4256948" }, { "@score":"1", "@id":"4256964", "info":{"authors":{"author":[{"@pid":"19/1046","text":"Camelia-Mihaela Pintea"},{"@pid":"28/3781","text":"Petrica C. Pop"},{"@pid":"97/3465","text":"Camelia Chira"}]},"title":"The Generalized Traveling Salesman Problem solved with Ant Algorithms.","venue":"CoRR","volume":"abs/1310.2350","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PinteaPC13","ee":"http://arxiv.org/abs/1310.2350","url":"https://dblp.org/rec/journals/corr/PinteaPC13"}, "url":"URL#4256964" }, { "@score":"1", "@id":"4256967", "info":{"authors":{"author":[{"@pid":"136/5853","text":"Rajeev Piyare"},{"@pid":"40/2669","text":"Seong Ro Lee"}]},"title":"Towards Internet of Things (IOTS): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing.","venue":"CoRR","volume":"abs/1310.2095","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PiyareL13","ee":"http://arxiv.org/abs/1310.2095","url":"https://dblp.org/rec/journals/corr/PiyareL13"}, "url":"URL#4256967" }, { "@score":"1", "@id":"4256978", "info":{"authors":{"author":[{"@pid":"139/0848","text":"Kiran Sree Pokkuluri"},{"@pid":"136/5954","text":"Ramesh Babu Inampudi"},{"@pid":"43/8658","text":"Devi Nedunuri Usha"}]},"title":"An Extensive Report on Cellular Automata Based Artificial Immune System for Strengthening Automated Protein Prediction.","venue":"CoRR","volume":"abs/1310.4342","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PokkuluriIU13","ee":"http://arxiv.org/abs/1310.4342","url":"https://dblp.org/rec/journals/corr/PokkuluriIU13"}, "url":"URL#4256978" }, { "@score":"1", "@id":"4256979", "info":{"authors":{"author":[{"@pid":"139/0848","text":"Kiran Sree Pokkuluri"},{"@pid":"136/5954","text":"Ramesh Babu Inampudi"},{"@pid":"43/8658","text":"Devi Nedunuri Usha"}]},"title":"Multiple Attractor Cellular Automata (MACA) for Addressing Major Problems in Bioinformatics.","venue":"CoRR","volume":"abs/1310.4495","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PokkuluriIU13a","ee":"http://arxiv.org/abs/1310.4495","url":"https://dblp.org/rec/journals/corr/PokkuluriIU13a"}, "url":"URL#4256979" }, { "@score":"1", "@id":"4256981", "info":{"authors":{"author":{"@pid":"136/6115","text":"Alexander Pokluda"}},"title":"Dynamic Resource Management using Operating System-Level Virtualization.","venue":"CoRR","volume":"abs/1310.3309","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Pokluda13","ee":"http://arxiv.org/abs/1310.3309","url":"https://dblp.org/rec/journals/corr/Pokluda13"}, "url":"URL#4256981" }, { "@score":"1", "@id":"4256982", "info":{"authors":{"author":[{"@pid":"136/6081","text":"Shaileen Crawford Pokress"},{"@pid":"136/6032","text":"José Juan Dominguez Veiga"}]},"title":"MIT App Inventor: Enabling Personal Mobile Computing.","venue":"CoRR","volume":"abs/1310.2830","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PokressV13","ee":"http://arxiv.org/abs/1310.2830","url":"https://dblp.org/rec/journals/corr/PokressV13"}, "url":"URL#4256982" }, { "@score":"1", "@id":"4256991", "info":{"authors":{"author":{"@pid":"117/3540","text":"Viviane Pons"}},"title":"Combinatoire algébrique liée aux ordres sur les permutations.","venue":"CoRR","volume":"abs/1310.1805","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Pons13","ee":"http://arxiv.org/abs/1310.1805","url":"https://dblp.org/rec/journals/corr/Pons13"}, "url":"URL#4256991" }, { "@score":"1", "@id":"4257021", "info":{"authors":{"author":[{"@pid":"24/2496","text":"V. B. Surya Prasath"},{"@pid":"115/7766","text":"Juan Carlos Moreno"}]},"title":"On Convergent Finite Difference Schemes for Variational - PDE Based Image Processing.","venue":"CoRR","volume":"abs/1310.7443","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PrasathM13","ee":"http://arxiv.org/abs/1310.7443","url":"https://dblp.org/rec/journals/corr/PrasathM13"}, "url":"URL#4257021" }, { "@score":"1", "@id":"4257029", "info":{"authors":{"author":[{"@pid":"47/4499","text":"Victor M. Preciado"},{"@pid":"55/8131","text":"Michael Zargham"},{"@pid":"36/1075","text":"David Sun"}]},"title":"Traffic Control for Network Protection Against Spreading Processes.","venue":"CoRR","volume":"abs/1310.4894","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PreciadoZS13","ee":"http://arxiv.org/abs/1310.4894","url":"https://dblp.org/rec/journals/corr/PreciadoZS13"}, "url":"URL#4257029" }, { "@score":"1", "@id":"4257033", "info":{"authors":{"author":[{"@pid":"136/6031","text":"Bradley S. Price"},{"@pid":"36/9486","text":"Charles J. Geyer"},{"@pid":"136/6131","text":"Adam J. Rothman"}]},"title":"Ridge Fusion in Statistical Learning.","venue":"CoRR","volume":"abs/1310.3892","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PriceGR13","ee":"http://arxiv.org/abs/1310.3892","url":"https://dblp.org/rec/journals/corr/PriceGR13"}, "url":"URL#4257033" }, { "@score":"1", "@id":"4257038", "info":{"authors":{"author":[{"@pid":"24/437","text":"Emmanuel Promayon"},{"@pid":"19/2580","text":"Céline Fouard"},{"@pid":"136/5962","text":"Mathieu Bailet"},{"@pid":"131/5902","text":"Aurélien Deram"},{"@pid":"135/8685","text":"Gaëlle Fiard"},{"@pid":"42/7413","text":"Nikolai Hungr"},{"@pid":"04/148","text":"Vincent Luboz"},{"@pid":"08/2109","text":"Yohan Payan"},{"@pid":"136/6018","text":"Johan Sarrazin"},{"@pid":"136/5736","text":"Nicolas Saubat"},{"@pid":"135/8646","text":"Sonia-Yuki Selmi"},{"@pid":"80/3412","text":"Sandrine Voros"},{"@pid":"63/3665","text":"Philippe Cinquin"},{"@pid":"24/3681","text":"Jocelyne Troccaz"}]},"title":"Using CamiTK for rapid prototyping of interactive Computer Assisted Medical Intervention applications.","venue":"CoRR","volume":"abs/1310.5497","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/PromayonFBDFHLPSSSVCT13","ee":"http://arxiv.org/abs/1310.5497","url":"https://dblp.org/rec/journals/corr/PromayonFBDFHLPSSSVCT13"}, "url":"URL#4257038" }, { "@score":"1", "@id":"4257045", "info":{"authors":{"author":{"@pid":"90/4284","text":"Pavel Pudlák"}},"title":"Linear tree codes and the problem of explicit constructions.","venue":"CoRR","volume":"abs/1310.5684","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Pudlak13","ee":"http://arxiv.org/abs/1310.5684","url":"https://dblp.org/rec/journals/corr/Pudlak13"}, "url":"URL#4257045" }, { "@score":"1", "@id":"4257052", "info":{"authors":{"author":[{"@pid":"74/2204","text":"Junaid Qadir 0001"},{"@pid":"02/5159","text":"Nadeem Ahmed"},{"@pid":"136/6029","text":"Nauman Ahad"}]},"title":"Building Programmable Wireless Networks: An Architectural Survey.","venue":"CoRR","volume":"abs/1310.0251","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QadirAA13","ee":"http://arxiv.org/abs/1310.0251","url":"https://dblp.org/rec/journals/corr/QadirAA13"}, "url":"URL#4257052" }, { "@score":"1", "@id":"4257055", "info":{"authors":{"author":[{"@pid":"07/4703","text":"Sameer Qazi"},{"@pid":"09/2727","text":"Tim Moors"}]},"title":"Finding Alternate Paths in the Internet: A Survey of Techniques for End-to-End Path Discovery.","venue":"CoRR","volume":"abs/1310.8125","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QaziM13","ee":"http://arxiv.org/abs/1310.8125","url":"https://dblp.org/rec/journals/corr/QaziM13"}, "url":"URL#4257055" }, { "@score":"1", "@id":"4257074", "info":{"authors":{"author":[{"@pid":"136/5812","text":"Zhen Qu"},{"@pid":"41/4882","text":"Shengli Zhang"},{"@pid":"73/8822","text":"Mingjun Dai"},{"@pid":"39/721-22","text":"Hui Wang 0022"}]},"title":"Secrecy Rate Study in Two-Hop Relay Channel with Finite Constellations.","venue":"CoRR","volume":"abs/1310.0612","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QuZDW13","ee":"http://arxiv.org/abs/1310.0612","url":"https://dblp.org/rec/journals/corr/QuZDW13"}, "url":"URL#4257074" }, { "@score":"1", "@id":"4257076", "info":{"authors":{"author":[{"@pid":"84/218","text":"Jing Quan"},{"@pid":"59/2293","text":"Yingjie Shi"},{"@pid":"39/6844","text":"Ming Zhao"},{"@pid":"03/1094","text":"Wei Yang"}]},"title":"The Implications from Benchmarking Three Big Data Systems.","venue":"CoRR","volume":"abs/1310.6546","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QuanSZY13","ee":"http://arxiv.org/abs/1310.6546","url":"https://dblp.org/rec/journals/corr/QuanSZY13"}, "url":"URL#4257076" }, { "@score":"1", "@id":"4257077", "info":{"authors":{"author":[{"@pid":"120/7566","text":"Nguyen Quang-Hung"},{"@pid":"07/4574","text":"Nam Thoai"},{"@pid":"58/5676-2","text":"Nguyen Thanh Son 0002"}]},"title":"Enery Efficient Allocation of Virtual Machines in High Performance Computing Cloud.","venue":"CoRR","volume":"abs/1310.7801","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Quang-HungTS13","ee":"http://arxiv.org/abs/1310.7801","url":"https://dblp.org/rec/journals/corr/Quang-HungTS13"}, "url":"URL#4257077" }, { "@score":"1", "@id":"4257085", "info":{"authors":{"author":[{"@pid":"34/8929","text":"Jean Quilbeuf"},{"@pid":"62/2129","text":"Georgeta Igna"},{"@pid":"134/5565","text":"Denis Bytschkow"},{"@pid":"28/800","text":"Harald Ruess"}]},"title":"Security policies for distributed systems.","venue":"CoRR","volume":"abs/1310.3723","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/QuilbeufIBR13","ee":"http://arxiv.org/abs/1310.3723","url":"https://dblp.org/rec/journals/corr/QuilbeufIBR13"}, "url":"URL#4257085" }, { "@score":"1", "@id":"4257090", "info":{"authors":{"author":[{"@pid":"85/10716","text":"Mary Radcliffe"},{"@pid":"05/4973","text":"Stephen J. Young"}]},"title":"Connectivity and Giant Component of Stochastic Kronecker Graphs.","venue":"CoRR","volume":"abs/1310.7652","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RadcliffeY13","ee":"http://arxiv.org/abs/1310.7652","url":"https://dblp.org/rec/journals/corr/RadcliffeY13"}, "url":"URL#4257090" }, { "@score":"1", "@id":"4257094", "info":{"authors":{"author":[{"@pid":"51/7997","text":"Khan Farhan Rafat"},{"@pid":"09/5197","text":"Muhammad Sher"}]},"title":"On The Limits Of Perfect Security For Steganographic System.","venue":"CoRR","volume":"abs/1310.5902","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RafatS13","ee":"http://arxiv.org/abs/1310.5902","url":"https://dblp.org/rec/journals/corr/RafatS13"}, "url":"URL#4257094" }, { "@score":"1", "@id":"4257098", "info":{"authors":{"author":[{"@pid":"57/7864","text":"N. S. Raghava"},{"@pid":"58/2520","text":"Asok De"},{"@pid":"136/6091","text":"Nitish Kataria"},{"@pid":"138/7321","text":"Sarthak Chatterjee"}]},"title":"Stacked Patch Antenna With Cross Slot Electronic Band Gap Structure.","venue":"CoRR","volume":"abs/1310.6259","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaghavaDKC13","ee":"http://arxiv.org/abs/1310.6259","url":"https://dblp.org/rec/journals/corr/RaghavaDKC13"}, "url":"URL#4257098" }, { "@score":"1", "@id":"4257099", "info":{"authors":{"author":[{"@pid":"69/3746","text":"Prasad Raghavendra"},{"@pid":"136/6089","text":"Tselil Schramm"}]},"title":"Gap Amplification for Small-Set Expansion via Random Walks.","venue":"CoRR","volume":"abs/1310.1493","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaghavendraS13","ee":"http://arxiv.org/abs/1310.1493","url":"https://dblp.org/rec/journals/corr/RaghavendraS13"}, "url":"URL#4257099" }, { "@score":"1", "@id":"4257111", "info":{"authors":{"author":[{"@pid":"99/10543","text":"Roozbeh Rajabi"},{"@pid":"79/3838","text":"Hassan Ghassemian"}]},"title":"Fusion of Hyperspectral and Panchromatic Images using Spectral Uumixing Results.","venue":"CoRR","volume":"abs/1310.5965","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RajabiG13a","ee":"http://arxiv.org/abs/1310.5965","url":"https://dblp.org/rec/journals/corr/RajabiG13a"}, "url":"URL#4257111" }, { "@score":"1", "@id":"4257115", "info":{"authors":{"author":[{"@pid":"54/8115","text":"Jayaprakash Rajasekharan"},{"@pid":"k/VisaKoivunen","text":"Visa Koivunen"}]},"title":"Optimal Energy Consumption Model for Smart Grid Households with Energy Storage.","venue":"CoRR","volume":"abs/1310.3424","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RajasekharanK13","ee":"http://arxiv.org/abs/1310.3424","url":"https://dblp.org/rec/journals/corr/RajasekharanK13"}, "url":"URL#4257115" }, { "@score":"1", "@id":"4257122", "info":{"authors":{"author":[{"@pid":"42/9493","text":"Gordana Rakic"},{"@pid":"84/4555","text":"Zoran Budimac"}]},"title":"Introducing Enriched Concrete Syntax Trees.","venue":"CoRR","volume":"abs/1310.0802","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RakicB13","ee":"http://arxiv.org/abs/1310.0802","url":"https://dblp.org/rec/journals/corr/RakicB13"}, "url":"URL#4257122" }, { "@score":"1", "@id":"4257124", "info":{"authors":{"author":[{"@pid":"42/9493","text":"Gordana Rakic"},{"@pid":"67/2858","text":"Ljubomir Jerinic"},{"@pid":"84/4555","text":"Zoran Budimac"},{"@pid":"97/1941","text":"Mirjana Ivanovic"}]},"title":"Sequencing and navigation through learning content.","venue":"CoRR","volume":"abs/1310.8204","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RakicJBI13","ee":"http://arxiv.org/abs/1310.8204","url":"https://dblp.org/rec/journals/corr/RakicJBI13"}, "url":"URL#4257124" }, { "@score":"1", "@id":"4257132", "info":{"authors":{"author":[{"@pid":"136/5943","text":"Rajib Rana"},{"@pid":"97/5374","text":"Daniel Austin"},{"@pid":"120/3889","text":"Peter G. Jacobs"},{"@pid":"11/7942","text":"Mohanraj Karunanithi"},{"@pid":"82/3067","text":"Jeffrey A. Kaye"}]},"title":"Passive In-home Estimation of Gait Velocity From Motion Sensors.","venue":"CoRR","volume":"abs/1310.4880","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RanaAJKK13","ee":"http://arxiv.org/abs/1310.4880","url":"https://dblp.org/rec/journals/corr/RanaAJKK13"}, "url":"URL#4257132" }, { "@score":"1", "@id":"4257133", "info":{"authors":{"author":[{"@pid":"136/5943","text":"Rajib Kumar Rana"},{"@pid":"79/812","text":"Chun Tung Chou"},{"@pid":"04/6227","text":"Nirupama Bulusu"},{"@pid":"42/840","text":"Salil S. Kanhere"},{"@pid":"01/6410","text":"Wen Hu"}]},"title":"Ear-Phone: A Context-Aware Noise Mapping using Smart Phones.","venue":"CoRR","volume":"abs/1310.4270","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RanaCBKH13","ee":"http://arxiv.org/abs/1310.4270","url":"https://dblp.org/rec/journals/corr/RanaCBKH13"}, "url":"URL#4257133" }, { "@score":"1", "@id":"4257134", "info":{"authors":{"author":[{"@pid":"136/5943","text":"Rajib Kumar Rana"},{"@pid":"01/6410","text":"Wen Hu"},{"@pid":"79/812","text":"Chun Tung Chou"}]},"title":"Signal Reconstruction from Rechargeable Wireless Sensor Networks using Sparse Random Projections.","venue":"CoRR","volume":"abs/1310.4284","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RanaHC13","ee":"http://arxiv.org/abs/1310.4284","url":"https://dblp.org/rec/journals/corr/RanaHC13"}, "url":"URL#4257134" }, { "@score":"1", "@id":"4257141", "info":{"authors":{"author":[{"@pid":"55/9828","text":"Apara Ranjan"},{"@pid":"91/419","text":"Liane Gabora"},{"@pid":"134/3475","text":"Brian O'Connor"}]},"title":"Evidence that Cross-Domain Re-interpretations of Creative Ideas are Recognizable.","venue":"CoRR","volume":"abs/1310.0519","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RanjanGO13","ee":"http://arxiv.org/abs/1310.0519","url":"https://dblp.org/rec/journals/corr/RanjanGO13"}, "url":"URL#4257141" }, { "@score":"1", "@id":"4257145", "info":{"authors":{"author":[{"@pid":"136/5915","text":"G. Srinivas Rao"},{"@pid":"33/10735","text":"A. V. Ramana"}]},"title":"Reinforcement Learning Framework for Opportunistic Routing in WSNs.","venue":"CoRR","volume":"abs/1310.8467","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaoR13","ee":"http://arxiv.org/abs/1310.8467","url":"https://dblp.org/rec/journals/corr/RaoR13"}, "url":"URL#4257145" }, { "@score":"1", "@id":"4257147", "info":{"authors":{"author":[{"@pid":"94/1283","text":"Michaël Rao"},{"@pid":"30/1875","text":"Michel Rigo"},{"@pid":"47/9959","text":"Pavel Salimov"}]},"title":"Avoiding 2-binomial squares and cubes.","venue":"CoRR","volume":"abs/1310.4743","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaoRS13","ee":"http://arxiv.org/abs/1310.4743","url":"https://dblp.org/rec/journals/corr/RaoRS13"}, "url":"URL#4257147" }, { "@score":"1", "@id":"4257152", "info":{"authors":{"author":[{"@pid":"69/3447","text":"Garvesh Raskutti"},{"@pid":"52/5375-1","text":"Sayan Mukherjee 0001"}]},"title":"The Information Geometry of Mirror Descent.","venue":"CoRR","volume":"abs/1310.7780","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RaskuttiM13","ee":"http://arxiv.org/abs/1310.7780","url":"https://dblp.org/rec/journals/corr/RaskuttiM13"}, "url":"URL#4257152" }, { "@score":"1", "@id":"4257167", "info":{"authors":{"author":{"@pid":"136/5705","text":"Veena Rawat"}},"title":"Reducing Failure Probability of cloud storage services using Multi-Clouds.","venue":"CoRR","volume":"abs/1310.4919","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rawat13","ee":"http://arxiv.org/abs/1310.4919","url":"https://dblp.org/rec/journals/corr/Rawat13"}, "url":"URL#4257167" }, { "@score":"1", "@id":"4257178", "info":{"authors":{"author":[{"@pid":"70/7800","text":"Henri Bruno Razafindradina"},{"@pid":"156/5544","text":"Karim Attoumani Mohamed"}]},"title":"Blind and robust images watermarking based on wavelet and edge insertion.","venue":"CoRR","volume":"abs/1310.5653","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RazafindradinaK13","ee":"http://arxiv.org/abs/1310.5653","url":"https://dblp.org/rec/journals/corr/RazafindradinaK13"}, "url":"URL#4257178" }, { "@score":"1", "@id":"4257184", "info":{"authors":{"author":[{"@pid":"10/427","text":"Abdul Razaque"},{"@pid":"04/3246","text":"Khaled M. Elleithy"}]},"title":"Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network.","venue":"CoRR","volume":"abs/1310.1129","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RazaqueE13b","ee":"http://arxiv.org/abs/1310.1129","url":"https://dblp.org/rec/journals/corr/RazaqueE13b"}, "url":"URL#4257184" }, { "@score":"1", "@id":"4257201", "info":{"authors":{"author":[{"@pid":"43/9044","text":"Jimmy S. J. Ren"},{"@pid":"35/7092-65","text":"Wei Wang 0065"},{"@pid":"98/7308-21","text":"Jiawei Wang 0021"},{"@pid":"53/3715","text":"Stephen Shaoyi Liao"}]},"title":"An Unsupervised Feature Learning Approach to Improve Automatic Incident Detection.","venue":"CoRR","volume":"abs/1310.7795","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RenWWL13a","ee":"http://arxiv.org/abs/1310.7795","url":"https://dblp.org/rec/journals/corr/RenWWL13a"}, "url":"URL#4257201" }, { "@score":"1", "@id":"4257206", "info":{"authors":{"author":[{"@pid":"132/9023","text":"Rafael Repiso"},{"@pid":"18/8508","text":"Emilio Delgado López-Cózar"}]},"title":"H Index Communication Journals according to Google Scholar Metrics (2008-2012).","venue":"CoRR","volume":"abs/1310.7378","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RepisoL13","ee":"http://arxiv.org/abs/1310.7378","url":"https://dblp.org/rec/journals/corr/RepisoL13"}, "url":"URL#4257206" }, { "@score":"1", "@id":"4257210", "info":{"authors":{"author":[{"@pid":"17/9511","text":"Jason K. Resch"},{"@pid":"136/6006","text":"Ilya Volvovski"}]},"title":"Reliability Models for Highly Fault-tolerant Storage Systems.","venue":"CoRR","volume":"abs/1310.4702","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ReschV13","ee":"http://arxiv.org/abs/1310.4702","url":"https://dblp.org/rec/journals/corr/ReschV13"}, "url":"URL#4257210" }, { "@score":"1", "@id":"4257215", "info":{"authors":{"author":[{"@pid":"136/5661","text":"Farideh Ebrahim Rezagah"},{"@pid":"15/5237","text":"Elza Erkip"}]},"title":"Interactive Function Computation with Reconstruction Constraints.","venue":"CoRR","volume":"abs/1310.2291","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RezagahE13","ee":"http://arxiv.org/abs/1310.2291","url":"https://dblp.org/rec/journals/corr/RezagahE13"}, "url":"URL#4257215" }, { "@score":"1", "@id":"4257216", "info":{"authors":{"author":[{"@pid":"136/5661","text":"Farideh Ebrahim Rezagah"},{"@pid":"15/5237","text":"Elza Erkip"}]},"title":"Interactive Relay Assisted Source Coding.","venue":"CoRR","volume":"abs/1310.2296","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RezagahE13a","ee":"http://arxiv.org/abs/1310.2296","url":"https://dblp.org/rec/journals/corr/RezagahE13a"}, "url":"URL#4257216" }, { "@score":"1", "@id":"4257217", "info":{"authors":{"author":[{"@pid":"02/4978","text":"Zouheir Rezki"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"On the Capacity of Multiple Access and Broadcast Fading Channels with Full Channel State Information at Low SNR.","venue":"CoRR","volume":"abs/1310.8532","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RezkiA13","ee":"http://arxiv.org/abs/1310.8532","url":"https://dblp.org/rec/journals/corr/RezkiA13"}, "url":"URL#4257217" }, { "@score":"1", "@id":"4257224", "info":{"authors":{"author":[{"@pid":"120/7600","text":"Benjamin Ricaud"},{"@pid":"49/263","text":"Guillaume Stempfel"},{"@pid":"01/6643","text":"Bruno Torrésani"},{"@pid":"95/7060","text":"Christoph Wiesmeyr"},{"@pid":"67/9951","text":"Hélène Lachambre"},{"@pid":"47/9650","text":"Darian M. Onchis"}]},"title":"An optimally concentrated Gabor transform for localized time-frequency components.","venue":"CoRR","volume":"abs/1310.8573","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RicaudSTWLO13","ee":"http://arxiv.org/abs/1310.8573","url":"https://dblp.org/rec/journals/corr/RicaudSTWLO13"}, "url":"URL#4257224" }, { "@score":"1", "@id":"4257225", "info":{"authors":{"author":{"@pid":"60/2903","text":"Elvinia Riccobene"}},"title":"Eclipse-IT 2013: Proceedings of VIII Workshop of the Italian Eclipse Community.","venue":"CoRR","volume":"abs/1310.2464","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Riccobene13","ee":"http://arxiv.org/abs/1310.2464","url":"https://dblp.org/rec/journals/corr/Riccobene13"}, "url":"URL#4257225" }, { "@score":"1", "@id":"4257227", "info":{"authors":{"author":{"@pid":"133/0102","text":"Jean-Loup Richet"}},"title":"Laundering Money Online: a review of cybercriminals methods.","venue":"CoRR","volume":"abs/1310.2368","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Richet13","ee":"http://arxiv.org/abs/1310.2368","url":"https://dblp.org/rec/journals/corr/Richet13"}, "url":"URL#4257227" }, { "@score":"1", "@id":"4257228", "info":{"authors":{"author":[{"@pid":"62/8001","text":"Peter Richtárik"},{"@pid":"42/3759-1","text":"Martin Takác 0001"}]},"title":"Distributed Coordinate Descent Method for Learning with Big Data.","venue":"CoRR","volume":"abs/1310.2059","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RichtarikT13","ee":"http://arxiv.org/abs/1310.2059","url":"https://dblp.org/rec/journals/corr/RichtarikT13"}, "url":"URL#4257228" }, { "@score":"1", "@id":"4257229", "info":{"authors":{"author":[{"@pid":"62/8001","text":"Peter Richtárik"},{"@pid":"42/3759-1","text":"Martin Takác 0001"}]},"title":"On Optimal Probabilities in Stochastic Coordinate Descent Methods.","venue":"CoRR","volume":"abs/1310.3438","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RichtarikT13a","ee":"http://arxiv.org/abs/1310.3438","url":"https://dblp.org/rec/journals/corr/RichtarikT13a"}, "url":"URL#4257229" }, { "@score":"1", "@id":"4257232", "info":{"authors":{"author":[{"@pid":"73/7858","text":"Martin Riedel"},{"@pid":"66/9735","text":"Marika Kästner"},{"@pid":"23/2793","text":"Fabrice Rossi"},{"@pid":"39/4025","text":"Thomas Villmann"}]},"title":"Regularization in Relevance Learning Vector Quantization Using l one Norms.","venue":"CoRR","volume":"abs/1310.5095","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RiedelKRV13","ee":"http://arxiv.org/abs/1310.5095","url":"https://dblp.org/rec/journals/corr/RiedelKRV13"}, "url":"URL#4257232" }, { "@score":"1", "@id":"4257233", "info":{"authors":{"author":{"@pid":"24/5239","text":"Ute Riemann"}},"title":"Value-chain oriented identification of indicators to establish a comprehensive process improvement framework.","venue":"CoRR","volume":"abs/1310.3230","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Riemann13","ee":"http://arxiv.org/abs/1310.3230","url":"https://dblp.org/rec/journals/corr/Riemann13"}, "url":"URL#4257233" }, { "@score":"1", "@id":"4257234", "info":{"authors":{"author":{"@pid":"26/1523","text":"Gerasimos G. Rigatos"}},"title":"A Kalman Filtering approach of improved precision for fault diagnosis in distributed parameter systems.","venue":"CoRR","volume":"abs/1310.3358","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rigatos13","ee":"http://arxiv.org/abs/1310.3358","url":"https://dblp.org/rec/journals/corr/Rigatos13"}, "url":"URL#4257234" }, { "@score":"1", "@id":"4257239", "info":{"authors":{"author":[{"@pid":"18/5916","text":"Shamim Ripon"},{"@pid":"118/3981","text":"Sk. Jahir Hossain"},{"@pid":"36/4026","text":"Touhid Bhuiyan"}]},"title":"Managing and Analysing Software Product Line Requirements.","venue":"CoRR","volume":"abs/1310.0152","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RiponHB13","ee":"http://arxiv.org/abs/1310.0152","url":"https://dblp.org/rec/journals/corr/RiponHB13"}, "url":"URL#4257239" }, { "@score":"1", "@id":"4257241", "info":{"authors":{"author":[{"@pid":"136/6181","text":"Martin Ritchie"},{"@pid":"b/LucBerthouze","text":"Luc Berthouze"},{"@pid":"76/8624","text":"Thomas A. House"},{"@pid":"74/8028","text":"Istvan Z. Kiss"}]},"title":"Higher-order structure and epidemic dynamics in clustered networks.","venue":"CoRR","volume":"abs/1310.5047","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RitchieBHK13","ee":"http://arxiv.org/abs/1310.5047","url":"https://dblp.org/rec/journals/corr/RitchieBHK13"}, "url":"URL#4257241" }, { "@score":"1", "@id":"4257256", "info":{"authors":{"author":[{"@pid":"117/3727","text":"Nicolás Robinson-García"},{"@pid":"64/7258","text":"Clara Calero-Medina"}]},"title":"What do university rankings by fields rank? Exploring discrepancies between the organizational structure of universities and bibliometric classifications.","venue":"CoRR","volume":"abs/1310.5892","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Robinson-GarciaC13","ee":"http://arxiv.org/abs/1310.5892","url":"https://dblp.org/rec/journals/corr/Robinson-GarciaC13"}, "url":"URL#4257256" }, { "@score":"1", "@id":"4257261", "info":{"authors":{"author":[{"@pid":"41/3615","text":"Andrew Robinson"},{"@pid":"70/10670","text":"Katharine Turner"}]},"title":"Hypothesis Testing for Topological Data Analysis.","venue":"CoRR","volume":"abs/1310.7467","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RobinsonT13","ee":"http://arxiv.org/abs/1310.7467","url":"https://dblp.org/rec/journals/corr/RobinsonT13"}, "url":"URL#4257261" }, { "@score":"1", "@id":"4257263", "info":{"authors":{"author":[{"@pid":"136/6083","text":"Marcus Vinicius de Melo Rocha"},{"@pid":"142/2703","text":"Carlo Kleber da Silva Rodrigues"}]},"title":"On client interactive behaviour to design peer selection policies for BitTorrent-like protocols.","venue":"CoRR","volume":"abs/1310.2166","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RochaR13","ee":"http://arxiv.org/abs/1310.2166","url":"https://dblp.org/rec/journals/corr/RochaR13"}, "url":"URL#4257263" }, { "@score":"1", "@id":"4257272", "info":{"authors":{"author":[{"@pid":"73/11466","text":"Ryan Rogalin"},{"@pid":"36/1445","text":"Ozgun Y. Bursalioglu"},{"@pid":"91/1872","text":"Haralabos C. Papadopoulos"},{"@pid":"19/2492","text":"Giuseppe Caire"},{"@pid":"54/2683","text":"Andreas F. Molisch"},{"@pid":"12/11469","text":"Antonios Michaloliakos"},{"@pid":"15/9796","text":"Horia Vlad Balan"},{"@pid":"68/3430","text":"Konstantinos Psounis"}]},"title":"Scalable Synchronization and Reciprocity Calibration for Distributed Multiuser MIMO.","venue":"CoRR","volume":"abs/1310.7001","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RogalinBPCMMBP13","ee":"http://arxiv.org/abs/1310.7001","url":"https://dblp.org/rec/journals/corr/RogalinBPCMMBP13"}, "url":"URL#4257272" }, { "@score":"1", "@id":"4257273", "info":{"authors":{"author":[{"@pid":"136/6021","text":"Mohammad Reza Rohbanian"},{"@pid":"136/5794","text":"Mohammad Rafi Kharazmi"},{"@pid":"47/5802","text":"Alireza Keshavarz-Haddad"},{"@pid":"136/5872","text":"Manije Keshtgary"}]},"title":"Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1310.3637","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RohbanianKKK13","ee":"http://arxiv.org/abs/1310.3637","url":"https://dblp.org/rec/journals/corr/RohbanianKKK13"}, "url":"URL#4257273" }, { "@score":"1", "@id":"4257274", "info":{"authors":{"author":[{"@pid":"136/5923","text":"Rudolf P. Rohr"},{"@pid":"136/5823","text":"Russel E. Naisbit"},{"@pid":"38/6911","text":"Christian Mazza"},{"@pid":"136/8322","text":"Louis-Félix Bersier"}]},"title":"Matching-centrality decomposition and the forecasting of new links in networks.","venue":"CoRR","volume":"abs/1310.4633","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RohrNMB13","ee":"http://arxiv.org/abs/1310.4633","url":"https://dblp.org/rec/journals/corr/RohrNMB13"}, "url":"URL#4257274" }, { "@score":"1", "@id":"4257282", "info":{"authors":{"author":{"@pid":"73/10961","text":"Alexander M. Romanov 0001"}},"title":"Full-Rank Perfect Codes over Finite Fields.","venue":"CoRR","volume":"abs/1310.1174","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Romanov13a","ee":"http://arxiv.org/abs/1310.1174","url":"https://dblp.org/rec/journals/corr/Romanov13a"}, "url":"URL#4257282" }, { "@score":"1", "@id":"4257283", "info":{"authors":{"author":[{"@pid":"88/10055","text":"Michal Romaszewski"},{"@pid":"34/1315","text":"Piotr Gawron"},{"@pid":"86/10055","text":"Sebastian Opozda"}]},"title":"Compression of animated 3D models using HO-SVD.","venue":"CoRR","volume":"abs/1310.1240","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RomaszewskiGO13","ee":"http://arxiv.org/abs/1310.1240","url":"https://dblp.org/rec/journals/corr/RomaszewskiGO13"}, "url":"URL#4257283" }, { "@score":"1", "@id":"4257312", "info":{"authors":{"author":[{"@pid":"23/2793","text":"Fabrice Rossi"},{"@pid":"49/10867","text":"Pierre Latouche"}]},"title":"Activity date estimation in timestamped interaction networks.","venue":"CoRR","volume":"abs/1310.4914","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RossiL13","ee":"http://arxiv.org/abs/1310.4914","url":"https://dblp.org/rec/journals/corr/RossiL13"}, "url":"URL#4257312" }, { "@score":"1", "@id":"4257314", "info":{"authors":{"author":[{"@pid":"136/5768","text":"Matthias Rost"},{"@pid":"58/3289-1","text":"Stefan Schmid 0001"}]},"title":"The Constrained Virtual Steiner Arborescence Problem: Formal Definition, Single-Commodity Integer Programming Formulation and Computational Evaluation.","venue":"CoRR","volume":"abs/1310.0346","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RostS13","ee":"http://arxiv.org/abs/1310.0346","url":"https://dblp.org/rec/journals/corr/RostS13"}, "url":"URL#4257314" }, { "@score":"1", "@id":"4257321", "info":{"authors":{"author":[{"@pid":"86/8091","text":"Eric S. Rowland"},{"@pid":"63/3520","text":"Reem Yassawi"}]},"title":"Automatic congruences for diagonals of rational functions.","venue":"CoRR","volume":"abs/1310.8635","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RowlandY13","ee":"http://arxiv.org/abs/1310.8635","url":"https://dblp.org/rec/journals/corr/RowlandY13"}, "url":"URL#4257321" }, { "@score":"1", "@id":"4257327", "info":{"authors":{"author":[{"@pid":"81/3825","text":"Michelle Rudolph-Lilith"},{"@pid":"57/9749","text":"Lyle E. Muller"}]},"title":"Aspects of randomness in neural graph structures.","venue":"CoRR","volume":"abs/1310.5062","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rudolph-LilithM13","ee":"http://arxiv.org/abs/1310.5062","url":"https://dblp.org/rec/journals/corr/Rudolph-LilithM13"}, "url":"URL#4257327" }, { "@score":"1", "@id":"4257328", "info":{"authors":{"author":[{"@pid":"04/4980","text":"Atri Rudra"},{"@pid":"79/7019","text":"Mary Wootters"}]},"title":"Every list-decodable code for high noise has abundant near-optimal rate puncturings.","venue":"CoRR","volume":"abs/1310.1891","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RudraW13","ee":"http://arxiv.org/abs/1310.1891","url":"https://dblp.org/rec/journals/corr/RudraW13"}, "url":"URL#4257328" }, { "@score":"1", "@id":"4257329", "info":{"authors":{"author":{"@pid":"87/7718","text":"Sonia L. Rueda"}},"title":"Differential elimination by differential specialization of Sylvester style matrices.","venue":"CoRR","volume":"abs/1310.2081","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rueda13","ee":"http://arxiv.org/abs/1310.2081","url":"https://dblp.org/rec/journals/corr/Rueda13"}, "url":"URL#4257329" }, { "@score":"1", "@id":"4257333", "info":{"authors":{"author":[{"@pid":"10/7278","text":"Matthias Rungger"},{"@pid":"43/2753","text":"Paulo Tabuada"}]},"title":"Abstracting and refining robustness for cyber-physical systems.","venue":"CoRR","volume":"abs/1310.5199","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RunggerT13","ee":"http://arxiv.org/abs/1310.5199","url":"https://dblp.org/rec/journals/corr/RunggerT13"}, "url":"URL#4257333" }, { "@score":"1", "@id":"4257336", "info":{"authors":{"author":{"@pid":"92/418","text":"Alexander Russakovsky"}},"title":"Hopping over Big Data: Accelerating Ad-hoc OLAP Queries with Grasshopper Algorithms.","venue":"CoRR","volume":"abs/1310.0141","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Russakovsky13","ee":"http://arxiv.org/abs/1310.0141","url":"https://dblp.org/rec/journals/corr/Russakovsky13"}, "url":"URL#4257336" }, { "@score":"1", "@id":"4257337", "info":{"authors":{"author":[{"@pid":"130/5236","text":"Benjamin Russell"},{"@pid":"s/SusanStepney","text":"Susan Stepney"}]},"title":"Zermelo Navigation and a Speed Limit to Quantum Information Processing.","venue":"CoRR","volume":"abs/1310.6731","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/RussellS13","ee":"http://arxiv.org/abs/1310.6731","url":"https://dblp.org/rec/journals/corr/RussellS13"}, "url":"URL#4257337" }, { "@score":"1", "@id":"4257338", "info":{"authors":{"author":{"@pid":"17/6385","text":"Irena Rusu"}},"title":"Extending Common Intervals Searching from Permutations to Sequences.","venue":"CoRR","volume":"abs/1310.4290","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rusu13","ee":"http://arxiv.org/abs/1310.4290","url":"https://dblp.org/rec/journals/corr/Rusu13"}, "url":"URL#4257338" }, { "@score":"1", "@id":"4257342", "info":{"authors":{"author":{"@pid":"49/916","text":"Boris Ryabko"}},"title":"Using Information Theory to Study the Efficiency and Capacity of Caching in the Computer Networks.","venue":"CoRR","volume":"abs/1310.3482","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ryabko13","ee":"http://arxiv.org/abs/1310.3482","url":"https://dblp.org/rec/journals/corr/Ryabko13"}, "url":"URL#4257342" }, { "@score":"1", "@id":"4257344", "info":{"authors":{"author":{"@pid":"63/9303","text":"Pawel Rzazewski"}},"title":"Exact Algorithm for Graph Homomorphism and Locally Injective Graph Homomorphism.","venue":"CoRR","volume":"abs/1310.3341","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Rzazewski13","ee":"http://arxiv.org/abs/1310.3341","url":"https://dblp.org/rec/journals/corr/Rzazewski13"}, "url":"URL#4257344" }, { "@score":"1", "@id":"4257352", "info":{"authors":{"author":[{"@pid":"s/DomenicoSacca","text":"Domenico Saccà"},{"@pid":"26/7789","text":"Edoardo Serra"},{"@pid":"136/5998","text":"Pietro Dicosta"},{"@pid":"00/5847","text":"Antonio Piccolo"}]},"title":"Multi-Sorted Inverse Frequent Itemsets Mining.","venue":"CoRR","volume":"abs/1310.3939","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SaccaSDP13","ee":"http://arxiv.org/abs/1310.3939","url":"https://dblp.org/rec/journals/corr/SaccaSDP13"}, "url":"URL#4257352" }, { "@score":"1", "@id":"4257364", "info":{"authors":{"author":[{"@pid":"92/815","text":"Dipankar Saha"},{"@pid":"135/6234","text":"Subhramita Basak"},{"@pid":"135/6098","text":"Sagar Mukherjee"},{"@pid":"116/4761","text":"Sayan Chatterjee"},{"@pid":"52/563","text":"Chandan Kumar Sarkar"}]},"title":"Implementation of the Cluster Based Tunable Sleep Transistor Cell Power Gating Technique for a 4x4 Multiplier Circuit.","venue":"CoRR","volume":"abs/1310.3203","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SahaBMCS13","ee":"http://arxiv.org/abs/1310.3203","url":"https://dblp.org/rec/journals/corr/SahaBMCS13"}, "url":"URL#4257364" }, { "@score":"1", "@id":"4257389", "info":{"authors":{"author":[{"@pid":"135/4984","text":"Naci Saldi"},{"@pid":"56/2539","text":"Tamás Linder"},{"@pid":"31/3208","text":"Serdar Yüksel"}]},"title":"Quantized Stationary Control Policies in Markov Decision Processes.","venue":"CoRR","volume":"abs/1310.5770","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SaldiLY13a","ee":"http://arxiv.org/abs/1310.5770","url":"https://dblp.org/rec/journals/corr/SaldiLY13a"}, "url":"URL#4257389" }, { "@score":"1", "@id":"4257390", "info":{"authors":{"author":[{"@pid":"132/9327","text":"Amer O. Abu Salem"},{"@pid":"132/9019","text":"Tareq Alhmiedat"},{"@pid":"62/8263","text":"Ghassan Samara"}]},"title":"Cache Discovery Policies of MANET.","venue":"CoRR","volume":"abs/1310.1552","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SalemAS13","ee":"http://arxiv.org/abs/1310.1552","url":"https://dblp.org/rec/journals/corr/SalemAS13"}, "url":"URL#4257390" }, { "@score":"1", "@id":"4257391", "info":{"authors":{"author":[{"@pid":"36/8194","text":"Christoph Salge"},{"@pid":"39/6052","text":"Cornelius Glackin"},{"@pid":"76/5904","text":"Daniel Polani"}]},"title":"Empowerment - an Introduction.","venue":"CoRR","volume":"abs/1310.1863","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SalgeGP13","ee":"http://arxiv.org/abs/1310.1863","url":"https://dblp.org/rec/journals/corr/SalgeGP13"}, "url":"URL#4257391" }, { "@score":"1", "@id":"4257392", "info":{"authors":{"author":[{"@pid":"36/8194","text":"Christoph Salge"},{"@pid":"76/5904","text":"Daniel Polani"}]},"title":"Changing the Environment based on Intrinsic Motivation.","venue":"CoRR","volume":"abs/1310.3692","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SalgeP13","ee":"http://arxiv.org/abs/1310.3692","url":"https://dblp.org/rec/journals/corr/SalgeP13"}, "url":"URL#4257392" }, { "@score":"1", "@id":"4257399", "info":{"authors":{"author":[{"@pid":"21/10396","text":"Ville Salo"},{"@pid":"20/11004","text":"Ilkka Törmä"}]},"title":"Playing with Subshifts.","venue":"CoRR","volume":"abs/1310.0650","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SaloT13a","ee":"http://arxiv.org/abs/1310.0650","url":"https://dblp.org/rec/journals/corr/SaloT13a"}, "url":"URL#4257399" }, { "@score":"1", "@id":"4257400", "info":{"authors":{"author":[{"@pid":"21/10396","text":"Ville Salo"},{"@pid":"20/11004","text":"Ilkka Törmä"}]},"title":"Constructions with Countable Subshifts of Finite Type.","venue":"CoRR","volume":"abs/1310.0654","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SaloT13b","ee":"http://arxiv.org/abs/1310.0654","url":"https://dblp.org/rec/journals/corr/SaloT13b"}, "url":"URL#4257400" }, { "@score":"1", "@id":"4257413", "info":{"authors":{"author":[{"@pid":"136/5975","text":"Anna Samoilenko"},{"@pid":"78/9885","text":"Taha Yasseri"}]},"title":"The distorted mirror of Wikipedia: a quantitative analysis of Wikipedia coverage of academics.","venue":"CoRR","volume":"abs/1310.8508","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SamoilenkoY13","ee":"http://arxiv.org/abs/1310.8508","url":"https://dblp.org/rec/journals/corr/SamoilenkoY13"}, "url":"URL#4257413" }, { "@score":"1", "@id":"4257416", "info":{"authors":{"author":[{"@pid":"38/1249","text":"Borhan Molazem Sanandaji"},{"@pid":"94/9185-1","text":"He Hao 0001"},{"@pid":"67/3903","text":"Kameshwar Poolla"},{"@pid":"04/7118","text":"Tyrone L. Vincent"}]},"title":"Improved Battery Models of an Aggregation of Thermostatically Controlled Loads for Frequency Regulation.","venue":"CoRR","volume":"abs/1310.1693","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SanandajiHPV13","ee":"http://arxiv.org/abs/1310.1693","url":"https://dblp.org/rec/journals/corr/SanandajiHPV13"}, "url":"URL#4257416" }, { "@score":"1", "@id":"4257420", "info":{"authors":{"author":[{"@pid":"23/5829","text":"Magnus Sandell"},{"@pid":"92/108","text":"Filippo Tosato"}]},"title":"Lowest Density MDS Array Codes for Reliable Smart Meter Networks.","venue":"CoRR","volume":"abs/1310.3695","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SandellT13a","ee":"http://arxiv.org/abs/1310.3695","url":"https://dblp.org/rec/journals/corr/SandellT13a"}, "url":"URL#4257420" }, { "@score":"1", "@id":"4257422", "info":{"authors":{"author":{"@pid":"33/5897","text":"Yasmine B. Sanderson"}},"title":"On infinite words avoiding a finite set of squares.","venue":"CoRR","volume":"abs/1310.7117","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Sanderson13","ee":"http://arxiv.org/abs/1310.7117","url":"https://dblp.org/rec/journals/corr/Sanderson13"}, "url":"URL#4257422" }, { "@score":"1", "@id":"4257427", "info":{"authors":{"author":[{"@pid":"89/2975","text":"Adrian Sandu"},{"@pid":"56/1310-5","text":"Michael Günther 0005"}]},"title":"A class of generalized additive Runge-Kutta methods.","venue":"CoRR","volume":"abs/1310.5573","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SanduG13","ee":"http://arxiv.org/abs/1310.5573","url":"https://dblp.org/rec/journals/corr/SanduG13"}, "url":"URL#4257427" }, { "@score":"1", "@id":"4257429", "info":{"authors":{"author":[{"@pid":"89/4072","text":"Ricardo G. Sanfelice"},{"@pid":"135/6093","text":"Sze Zheng Yong"},{"@pid":"78/2284","text":"Emilio Frazzoli"}]},"title":"On Minimum-time Paths of Bounded Curvature with Position-dependent Constraints.","venue":"CoRR","volume":"abs/1310.2578","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SanfeliceYF13","ee":"http://arxiv.org/abs/1310.2578","url":"https://dblp.org/rec/journals/corr/SanfeliceYF13"}, "url":"URL#4257429" }, { "@score":"1", "@id":"4257432", "info":{"authors":{"author":[{"@pid":"93/9610","text":"Pedro E. Santacruz"},{"@pid":"91/6560","text":"Vaneet Aggarwal"},{"@pid":"45/284","text":"Ashutosh Sabharwal"}]},"title":"Leveraging Physical Layer Capabilites: Distributed Scheduling in Interference Networks with Local Views.","venue":"CoRR","volume":"abs/1310.6443","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SantacruzAS13","ee":"http://arxiv.org/abs/1310.6443","url":"https://dblp.org/rec/journals/corr/SantacruzAS13"}, "url":"URL#4257432" }, { "@score":"1", "@id":"4257433", "info":{"authors":{"author":[{"@pid":"43/1361","text":"Paolo Santi"},{"@pid":"59/2622","text":"Giovanni Resta"},{"@pid":"84/10671","text":"Michael Szell"},{"@pid":"133/8494","text":"Stanislav Sobolevsky"},{"@pid":"48/5492","text":"Steven H. Strogatz"},{"@pid":"00/5561","text":"Carlo Ratti"}]},"title":"Taxi pooling in New York City: a network-based approach to social sharing problems.","venue":"CoRR","volume":"abs/1310.2963","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SantiRSSSR13","ee":"http://arxiv.org/abs/1310.2963","url":"https://dblp.org/rec/journals/corr/SantiRSSSR13"}, "url":"URL#4257433" }, { "@score":"1", "@id":"4257438", "info":{"authors":{"author":[{"@pid":"s/VijayASaraswat","text":"Vijay A. Saraswat"},{"@pid":"j/RJagadeesan","text":"Radha Jagadeesan"},{"@pid":"g/VineetGupta","text":"Vineet Gupta 0001"}]},"title":"TCC, with History.","venue":"CoRR","volume":"abs/1310.5538","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SaraswatJG13","ee":"http://arxiv.org/abs/1310.5538","url":"https://dblp.org/rec/journals/corr/SaraswatJG13"}, "url":"URL#4257438" }, { "@score":"1", "@id":"4257439", "info":{"authors":{"author":{"@pid":"124/3848","text":"Sayantan Sarkar"}},"title":"Word Spotting in Cursive Handwritten Documents using Modified Character Shape Codes.","venue":"CoRR","volume":"abs/1310.6063","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Sarkar13","ee":"http://arxiv.org/abs/1310.6063","url":"https://dblp.org/rec/journals/corr/Sarkar13"}, "url":"URL#4257439" }, { "@score":"1", "@id":"4257440", "info":{"authors":{"author":{"@pid":"124/3848","text":"Sayantan Sarkar"}},"title":"Skin Segmentation based Elastic Bunch Graph Matching for efficient multiple Face Recognition.","venue":"CoRR","volume":"abs/1310.6066","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Sarkar13a","ee":"http://arxiv.org/abs/1310.6066","url":"https://dblp.org/rec/journals/corr/Sarkar13a"}, "url":"URL#4257440" }, { "@score":"1", "@id":"4257446", "info":{"authors":{"author":[{"@pid":"46/4888","text":"Atish Das Sarma"},{"@pid":"12/10827","text":"Anisur Rahaman Molla"},{"@pid":"p/GopalPandurangan","text":"Gopal Pandurangan"}]},"title":"Distributed Computation of Sparse Cuts.","venue":"CoRR","volume":"abs/1310.5407","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SarmaMP13","ee":"http://arxiv.org/abs/1310.5407","url":"https://dblp.org/rec/journals/corr/SarmaMP13"}, "url":"URL#4257446" }, { "@score":"1", "@id":"4257455", "info":{"authors":{"author":[{"@pid":"22/10703","text":"Tatsuya Sasaki"},{"@pid":"122/3041","text":"Satoshi Uchida"}]},"title":"Rewards and the evolution of cooperation in public good games.","venue":"CoRR","volume":"abs/1310.5520","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SasakiU13","ee":"http://arxiv.org/abs/1310.5520","url":"https://dblp.org/rec/journals/corr/SasakiU13"}, "url":"URL#4257455" }, { "@score":"1", "@id":"4257473", "info":{"authors":{"author":{"@pid":"21/7589","text":"Or Sattath"}},"title":"An Almost Sudden Jump in Quantum Complexity.","venue":"CoRR","volume":"abs/1310.5372","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Sattath13","ee":"http://arxiv.org/abs/1310.5372","url":"https://dblp.org/rec/journals/corr/Sattath13"}, "url":"URL#4257473" }, { "@score":"1", "@id":"4257485", "info":{"authors":{"author":[{"@pid":"78/9667","text":"Jonathan Scarlett"},{"@pid":"60/2327","text":"Vincent Y. F. Tan"}]},"title":"Second-Order Asymptotics for the Gaussian MAC with Degraded Message Sets.","venue":"CoRR","volume":"abs/1310.1197","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ScarlettT13","ee":"http://arxiv.org/abs/1310.1197","url":"https://dblp.org/rec/journals/corr/ScarlettT13"}, "url":"URL#4257485" }, { "@score":"1", "@id":"4257489", "info":{"authors":{"author":{"@pid":"136/6143","text":"Moritz Schattka"}},"title":"Algorithms for Timed Consistency Models.","venue":"CoRR","volume":"abs/1310.7205","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Schattka13","ee":"http://arxiv.org/abs/1310.7205","url":"https://dblp.org/rec/journals/corr/Schattka13"}, "url":"URL#4257489" }, { "@score":"1", "@id":"4257490", "info":{"authors":{"author":[{"@pid":"05/8655","text":"Robin Scheibler"},{"@pid":"96/10961","text":"Saeid Haghighatshoar"},{"@pid":"v/MVetterli","text":"Martin Vetterli"}]},"title":"A Fast Hadamard Transform for Signals with Sub-linear Sparsity.","venue":"CoRR","volume":"abs/1310.1803","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ScheiblerHV13","ee":"http://arxiv.org/abs/1310.1803","url":"https://dblp.org/rec/journals/corr/ScheiblerHV13"}, "url":"URL#4257490" }, { "@score":"1", "@id":"4257502", "info":{"authors":{"author":{"@pid":"65/6181","text":"Burkhard C. Schipper"}},"title":"TARK 2013 - Proceedings of the 14. Conference on Theoretical Aspects of Rationality and Knowledge.","venue":"CoRR","volume":"abs/1310.6382","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Schipper13","ee":"http://arxiv.org/abs/1310.6382","url":"https://dblp.org/rec/journals/corr/Schipper13"}, "url":"URL#4257502" }, { "@score":"1", "@id":"4257516", "info":{"authors":{"author":{"@pid":"16/370","text":"Carsten Schneider"}},"title":"Modern Summation Methods for Loop Integrals in Quantum Field Theory: The Packages Sigma, EvaluateMultiSums and SumProduction.","venue":"CoRR","volume":"abs/1310.0160","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Schneider13b","ee":"http://arxiv.org/abs/1310.0160","url":"https://dblp.org/rec/journals/corr/Schneider13b"}, "url":"URL#4257516" }, { "@score":"1", "@id":"4257527", "info":{"authors":{"author":[{"@pid":"30/4076","text":"Hans-Peter Schröcker"},{"@pid":"136/5750","text":"Matthias J. Weber"}]},"title":"Guaranteed Collision Detection With Toleranced Motions.","venue":"CoRR","volume":"abs/1310.8097","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SchrockerW13","ee":"http://arxiv.org/abs/1310.8097","url":"https://dblp.org/rec/journals/corr/SchrockerW13"}, "url":"URL#4257527" }, { "@score":"1", "@id":"4257535", "info":{"authors":{"author":[{"@pid":"71/3093","text":"Martin Schwarz"},{"@pid":"30/8147","text":"Maarten Van den Nest"}]},"title":"Simulating Quantum Circuits with Sparse Output Distributions.","venue":"CoRR","volume":"abs/1310.6749","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SchwarzN13","ee":"http://arxiv.org/abs/1310.6749","url":"https://dblp.org/rec/journals/corr/SchwarzN13"}, "url":"URL#4257535" }, { "@score":"1", "@id":"4257552", "info":{"authors":{"author":[{"@pid":"136/6166","text":"Sumeet Kaur Sehra"},{"@pid":"136/6142","text":"Yadwinder Singh Brar"},{"@pid":"37/2341","text":"Navdeep Kaur"}]},"title":"Multi criteria decision making approach for selecting effort estimation model.","venue":"CoRR","volume":"abs/1310.5220","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SehraBK13","ee":"http://arxiv.org/abs/1310.5220","url":"https://dblp.org/rec/journals/corr/SehraBK13"}, "url":"URL#4257552" }, { "@score":"1", "@id":"4257553", "info":{"authors":{"author":[{"@pid":"136/6166","text":"Sumeet Kaur Sehra"},{"@pid":"136/6142","text":"Yadwinder Singh Brar"},{"@pid":"37/2341","text":"Navdeep Kaur"}]},"title":"Soft computing techniques for software effort estimation.","venue":"CoRR","volume":"abs/1310.5221","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SehraBK13a","ee":"http://arxiv.org/abs/1310.5221","url":"https://dblp.org/rec/journals/corr/SehraBK13a"}, "url":"URL#4257553" }, { "@score":"1", "@id":"4257554", "info":{"authors":{"author":[{"@pid":"136/6166","text":"Sumeet Kaur Sehra"},{"@pid":"136/6171","text":"Jasneet Kaur"},{"@pid":"133/8250","text":"Sukhjit Singh Sehra"}]},"title":"Effect of data preprocessing on software effort estimation.","venue":"CoRR","volume":"abs/1310.5222","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SehraKS13","ee":"http://arxiv.org/abs/1310.5222","url":"https://dblp.org/rec/journals/corr/SehraKS13"}, "url":"URL#4257554" }, { "@score":"1", "@id":"4257561", "info":{"authors":{"author":[{"@pid":"130/9752","text":"Jori Selen"},{"@pid":"01/3623","text":"Yoni Nazarathy"},{"@pid":"22/58","text":"Lachlan L. H. Andrew"},{"@pid":"20/5601","text":"Hai Le Vu"}]},"title":"The age of information in gossip networks.","venue":"CoRR","volume":"abs/1310.7919","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SelenNAV13","ee":"http://arxiv.org/abs/1310.7919","url":"https://dblp.org/rec/journals/corr/SelenNAV13"}, "url":"URL#4257561" }, { "@score":"1", "@id":"4257563", "info":{"authors":{"author":[{"@pid":"00/1494","text":"Jeremy Seligman"},{"@pid":"19/5949","text":"Fenrong Liu"},{"@pid":"48/6113-4","text":"Patrick Girard 0004"}]},"title":"Facebook and the Epistemic Logic of Friendship.","venue":"CoRR","volume":"abs/1310.6440","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SeligmanLG13","ee":"http://arxiv.org/abs/1310.6440","url":"https://dblp.org/rec/journals/corr/SeligmanLG13"}, "url":"URL#4257563" }, { "@score":"1", "@id":"4257569", "info":{"authors":{"author":[{"@pid":"136/5976","text":"Pinar Sen"},{"@pid":"06/9197","text":"Tugcan Aktas"},{"@pid":"22/7804","text":"Ali Özgür Yilmaz"}]},"title":"A Low-Complexity Graph-Based LMMSE Receiver Designed for Colored Noise Induced by FTN-Signaling.","venue":"CoRR","volume":"abs/1310.3381","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SenAY13","ee":"http://arxiv.org/abs/1310.3381","url":"https://dblp.org/rec/journals/corr/SenAY13"}, "url":"URL#4257569" }, { "@score":"1", "@id":"4257573", "info":{"authors":{"author":[{"@pid":"73/1177","text":"Alexandre da Costa Sena"},{"@pid":"50/3811","text":"Aline de Paula Nascimento"},{"@pid":"89/6061","text":"Cristina Boeres"},{"@pid":"79/2476","text":"Vinod E. F. Rebello"},{"@pid":"03/10107","text":"André Bulcão"}]},"title":"Improving Memory Hierarchy Utilisation for Stencil Computations on Multicore Machines.","venue":"CoRR","volume":"abs/1310.8232","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SenaNBRB13","ee":"http://arxiv.org/abs/1310.8232","url":"https://dblp.org/rec/journals/corr/SenaNBRB13"}, "url":"URL#4257573" }, { "@score":"1", "@id":"4257585", "info":{"authors":{"author":{"@pid":"98/1044","text":"Antoaneta Serguieva"}},"title":"Systemic Risk Identification, Modelling, Analysis, and Monitoring: An Integrated Approach.","venue":"CoRR","volume":"abs/1310.6486","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Serguieva13","ee":"http://arxiv.org/abs/1310.6486","url":"https://dblp.org/rec/journals/corr/Serguieva13"}, "url":"URL#4257585" }, { "@score":"1", "@id":"4257595", "info":{"authors":{"author":[{"@pid":"140/8168","text":"Paolo Sgrignoli"},{"@pid":"140/8138","text":"Rodolfo Metulini"},{"@pid":"23/8193","text":"Stefano Schiavo"},{"@pid":"54/10140","text":"Massimo Riccaboni"}]},"title":"The Relation Between Global Migration and Trade Networks.","venue":"CoRR","volume":"abs/1310.3716","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SgrignoliMSR13","ee":"http://arxiv.org/abs/1310.3716","url":"https://dblp.org/rec/journals/corr/SgrignoliMSR13"}, "url":"URL#4257595" }, { "@score":"1", "@id":"4257597", "info":{"authors":{"author":[{"@pid":"96/8306","text":"Gil Shabat"},{"@pid":"126/4825","text":"Yaniv Shmueli"},{"@pid":"a/AmirAverbuch","text":"Amir Averbuch"}]},"title":"Randomized LU Decomposition.","venue":"CoRR","volume":"abs/1310.7202","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShabatSA13","ee":"http://arxiv.org/abs/1310.7202","url":"https://dblp.org/rec/journals/corr/ShabatSA13"}, "url":"URL#4257597" }, { "@score":"1", "@id":"4257600", "info":{"authors":{"author":[{"@pid":"193/2306","text":"Naveed Anjum"},{"@pid":"61/2979","text":"Imran Shafi"},{"@pid":"136/5879","text":"Sohail Abidi"}]},"title":"Evaluation and Performance of Reactive Protocols Using Mobility Model.","venue":"CoRR","volume":"abs/1310.5848","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShafiA13a","ee":"http://arxiv.org/abs/1310.5848","url":"https://dblp.org/rec/journals/corr/ShafiA13a"}, "url":"URL#4257600" }, { "@score":"1", "@id":"4257605", "info":{"authors":{"author":[{"@pid":"36/8658","text":"Tapan Shah 0001"},{"@pid":"d/OnkarDabeer","text":"Onkar Dabeer"}]},"title":"Transmit Beamforming for MIMO Communication Systems with Low Precision ADC at the Receiver.","venue":"CoRR","volume":"abs/1310.1571","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShahD13","ee":"http://arxiv.org/abs/1310.1571","url":"https://dblp.org/rec/journals/corr/ShahD13"}, "url":"URL#4257605" }, { "@score":"1", "@id":"4257607", "info":{"authors":{"author":[{"@pid":"10/8178","text":"Shalin Shah"},{"@pid":"131/6889","text":"Dixita Limbachiya"},{"@pid":"70/6471-4","text":"Manish K. Gupta 0004"}]},"title":"DNACloud: A Potential Tool for storing Big Data on DNA.","venue":"CoRR","volume":"abs/1310.6992","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShahLG13","ee":"http://arxiv.org/abs/1310.6992","url":"https://dblp.org/rec/journals/corr/ShahLG13"}, "url":"URL#4257607" }, { "@score":"1", "@id":"4257612", "info":{"authors":{"author":[{"@pid":"127/7489","text":"Shahin Shahrampour"},{"@pid":"59/407","text":"Alexander Rakhlin"},{"@pid":"83/3158","text":"Ali Jadbabaie"}]},"title":"Online Learning of Dynamic Parameters in Social Networks.","venue":"CoRR","volume":"abs/1310.0432","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShahrampourRJ13","ee":"http://arxiv.org/abs/1310.0432","url":"https://dblp.org/rec/journals/corr/ShahrampourRJ13"}, "url":"URL#4257612" }, { "@score":"1", "@id":"4257613", "info":{"authors":{"author":[{"@pid":"136/5655","text":"Saeid Montazeri Shahtouri"},{"@pid":"70/3312","text":"Richard T. B. Ma"}]},"title":"Selection Policy: Fighting against Filter Effect in Network of Caches.","venue":"CoRR","volume":"abs/1310.3584","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShahtouriM13","ee":"http://arxiv.org/abs/1310.3584","url":"https://dblp.org/rec/journals/corr/ShahtouriM13"}, "url":"URL#4257613" }, { "@score":"1", "@id":"4257628", "info":{"authors":{"author":[{"@pid":"120/7508","text":"Varun Shankar"},{"@pid":"64/2168","text":"Grady B. Wright"},{"@pid":"17/1236","text":"Aaron L. Fogelson"},{"@pid":"k/RobertMKirby","text":"Robert M. Kirby"}]},"title":"A Radial Basis Function (RBF)-Finite Difference Method for the Simulation of Reaction-Diffusion Equations on Stationary Platelets within the Augmented Forcing Method.","venue":"CoRR","volume":"abs/1310.5207","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShankarWFK13","ee":"http://arxiv.org/abs/1310.5207","url":"https://dblp.org/rec/journals/corr/ShankarWFK13"}, "url":"URL#4257628" }, { "@score":"1", "@id":"4257631", "info":{"authors":{"author":[{"@pid":"136/5634","text":"S. Shanmugapriyaa"},{"@pid":"59/10964","text":"K. S. Kuppusamy"},{"@pid":"57/4608","text":"Gnanasekaran Aghila"}]},"title":"BloSEn: Blog Search Engine Based On Post Concept Clustering.","venue":"CoRR","volume":"abs/1310.2127","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShanmugapriyaaKA13","ee":"http://arxiv.org/abs/1310.2127","url":"https://dblp.org/rec/journals/corr/ShanmugapriyaaKA13"}, "url":"URL#4257631" }, { "@score":"1", "@id":"4257632", "info":{"authors":{"author":[{"@pid":"136/6008","text":"Weixiang Shao"},{"@pid":"50/2124","text":"Xiaoxiao Shi"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"}]},"title":"Clustering on Multiple Incomplete Datasets via Collective Kernel Learning.","venue":"CoRR","volume":"abs/1310.1177","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShaoSY13","ee":"http://arxiv.org/abs/1310.1177","url":"https://dblp.org/rec/journals/corr/ShaoSY13"}, "url":"URL#4257632" }, { "@score":"1", "@id":"4257642", "info":{"authors":{"author":{"@pid":"136/5789","text":"Iti Sharma"}},"title":"Fully Homomorphic Encryption Scheme with Symmetric Keys.","venue":"CoRR","volume":"abs/1310.2452","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Sharma13a","ee":"http://arxiv.org/abs/1310.2452","url":"https://dblp.org/rec/journals/corr/Sharma13a"}, "url":"URL#4257642" }, { "@score":"1", "@id":"4257653", "info":{"authors":{"author":[{"@pid":"25/2664","text":"Swakkhar Shatabda"},{"@pid":"80/1228","text":"M. A. Hakim Newton"},{"@pid":"35/6186","text":"Duc Nghia Pham"},{"@pid":"s/AbdulSattar","text":"Abdul Sattar 0001"}]},"title":"A Hybrid Local Search for Simplified Protein Structure Prediction.","venue":"CoRR","volume":"abs/1310.8583","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShatabdaNPS13","ee":"http://arxiv.org/abs/1310.8583","url":"https://dblp.org/rec/journals/corr/ShatabdaNPS13"}, "url":"URL#4257653" }, { "@score":"1", "@id":"4257671", "info":{"authors":{"author":[{"@pid":"129/1008","text":"Yuanming Shi"},{"@pid":"z/JunZhang4","text":"Jun Zhang 0004"},{"@pid":"95/5358","text":"Khaled Ben Letaief"}]},"title":"Group Sparse Beamforming for Green Cloud-RAN.","venue":"CoRR","volume":"abs/1310.0234","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Shi0L13","ee":"http://arxiv.org/abs/1310.0234","url":"https://dblp.org/rec/journals/corr/Shi0L13"}, "url":"URL#4257671" }, { "@score":"1", "@id":"4257699", "info":{"authors":{"author":[{"@pid":"119/3915","text":"Mahyar Shirvanimoghaddam"},{"@pid":"59/6828-1","text":"Yonghui Li 0001"},{"@pid":"84/3821","text":"Branka Vucetic"}]},"title":"Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels.","venue":"CoRR","volume":"abs/1310.0557","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShirvanimoghaddamLV13","ee":"http://arxiv.org/abs/1310.0557","url":"https://dblp.org/rec/journals/corr/ShirvanimoghaddamLV13"}, "url":"URL#4257699" }, { "@score":"1", "@id":"4257709", "info":{"authors":{"author":[{"@pid":"136/5912","text":"Alon Shtern"},{"@pid":"k/RonKimmel","text":"Ron Kimmel"}]},"title":"Matching LBO eigenspace of non-rigid shapes via high order statistics.","venue":"CoRR","volume":"abs/1310.4459","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShternK13","ee":"http://arxiv.org/abs/1310.4459","url":"https://dblp.org/rec/journals/corr/ShternK13"}, "url":"URL#4257709" }, { "@score":"1", "@id":"4257713", "info":{"authors":{"author":[{"@pid":"118/7031","text":"Ravi Shankar Shukla"},{"@pid":"18/7503","text":"Neeraj Tyagi"}]},"title":"Global mibility and handover management for heterogeneous network in VANET.","venue":"CoRR","volume":"abs/1310.4949","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/ShuklaT13","ee":"http://arxiv.org/abs/1310.4949","url":"https://dblp.org/rec/journals/corr/ShuklaT13"}, "url":"URL#4257713" }, { "@score":"1", "@id":"4257727", "info":{"authors":{"author":[{"@pid":"95/7007","text":"Marco Signoretto"},{"@pid":"28/4664","text":"Lieven De Lathauwer"},{"@pid":"61/3224","text":"Johan A. K. Suykens"}]},"title":"Learning Tensors in Reproducing Kernel Hilbert Spaces with Multilinear Spectral Penalties.","venue":"CoRR","volume":"abs/1310.4977","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SignorettoLS13","ee":"http://arxiv.org/abs/1310.4977","url":"https://dblp.org/rec/journals/corr/SignorettoLS13"}, "url":"URL#4257727" }, { "@score":"1", "@id":"4257728", "info":{"authors":{"author":[{"@pid":"36/8160","text":"Ivan Sikiric"},{"@pid":"20/9596","text":"Karla Brkic"},{"@pid":"42/3275","text":"Sinisa Segvic"}]},"title":"Classifying Traffic Scenes Using The GIST Image Descriptor.","venue":"CoRR","volume":"abs/1310.0316","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SikiricBS13","ee":"http://arxiv.org/abs/1310.0316","url":"https://dblp.org/rec/journals/corr/SikiricBS13"}, "url":"URL#4257728" }, { "@score":"1", "@id":"4257729", "info":{"authors":{"author":[{"@pid":"136/5788","text":"Sahil Sikka"},{"@pid":"119/1499","text":"Karan Sikka"},{"@pid":"04/4787","text":"Manas Kamal Bhuyan"},{"@pid":"15/6471","text":"Yuji Iwahori"}]},"title":"Pseudo vs. True Defect Classification in Printed Circuits Boards using Wavelet Features.","venue":"CoRR","volume":"abs/1310.6654","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SikkaSBI13","ee":"http://arxiv.org/abs/1310.6654","url":"https://dblp.org/rec/journals/corr/SikkaSBI13"}, "url":"URL#4257729" }, { "@score":"1", "@id":"4257745", "info":{"authors":{"author":[{"@pid":"25/7912","text":"Sarabjot Singh"},{"@pid":"b/FrancoisBaccelli","text":"François Baccelli"},{"@pid":"84/4900","text":"Jeffrey G. Andrews"}]},"title":"On Association Cells in Random Heterogeneous Networks.","venue":"CoRR","volume":"abs/1310.1419","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SinghBA13","ee":"http://arxiv.org/abs/1310.1419","url":"https://dblp.org/rec/journals/corr/SinghBA13"}, "url":"URL#4257745" }, { "@score":"1", "@id":"4257754", "info":{"authors":{"author":[{"@pid":"22/7495","text":"Jyoti Singh"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Development of Marathi Part of Speech Tagger Using Statistical Approach.","venue":"CoRR","volume":"abs/1310.0575","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SinghJM13a","ee":"http://arxiv.org/abs/1310.0575","url":"https://dblp.org/rec/journals/corr/SinghJM13a"}, "url":"URL#4257754" }, { "@score":"1", "@id":"4257765", "info":{"authors":{"author":[{"@pid":"93/4614","text":"Ashutosh Singh"},{"@pid":"23/560","text":"Yatindra Nath Singh"}]},"title":"Approaches toward Maintaining Bi-connectivity for Resilience in Overlaid Multicasting.","venue":"CoRR","volume":"abs/1310.4291","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SinghS13c","ee":"http://arxiv.org/abs/1310.4291","url":"https://dblp.org/rec/journals/corr/SinghS13c"}, "url":"URL#4257765" }, { "@score":"1", "@id":"4257767", "info":{"authors":{"author":[{"@pid":"44/8094","text":"Vijay Singh"},{"@pid":"136/5721","text":"Martin Tchernookov"},{"@pid":"136/5900","text":"Rebecca Butterfield"},{"@pid":"83/5659","text":"Ilya Nemenman"}]},"title":"Continuum dynamics model of the primary visual cortex for contour detection.","venue":"CoRR","volume":"abs/1310.1341","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SinghTBN13","ee":"http://arxiv.org/abs/1310.1341","url":"https://dblp.org/rec/journals/corr/SinghTBN13"}, "url":"URL#4257767" }, { "@score":"1", "@id":"4257776", "info":{"authors":{"author":[{"@pid":"136/5994","text":"Shiladitya Sinha"},{"@pid":"41/6895","text":"Chris Dyer"},{"@pid":"47/1252","text":"Kevin Gimpel"},{"@pid":"90/5204","text":"Noah A. Smith"}]},"title":"Predicting the NFL using Twitter.","venue":"CoRR","volume":"abs/1310.6998","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SinhaDGS13","ee":"http://arxiv.org/abs/1310.6998","url":"https://dblp.org/rec/journals/corr/SinhaDGS13"}, "url":"URL#4257776" }, { "@score":"1", "@id":"4257784", "info":{"authors":{"author":[{"@pid":"78/1518","text":"Vasilios A. Siris"},{"@pid":"131/6601","text":"Maria Anagnostopoulou"},{"@pid":"136/5960","text":"Dimitris Dimopoulos"}]},"title":"Improving Mobile Video Streaming with Mobility Prediction and Prefetching in Integrated Cellular-WiFi Networks.","venue":"CoRR","volume":"abs/1310.6171","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SirisAD13","ee":"http://arxiv.org/abs/1310.6171","url":"https://dblp.org/rec/journals/corr/SirisAD13"}, "url":"URL#4257784" }, { "@score":"1", "@id":"4257798", "info":{"authors":{"author":{"@pid":"36/386","text":"Thabet Slimani"}},"title":"Semantic Description of Web Services.","venue":"CoRR","volume":"abs/1310.7367","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Slimani13","ee":"http://arxiv.org/abs/1310.7367","url":"https://dblp.org/rec/journals/corr/Slimani13"}, "url":"URL#4257798" }, { "@score":"1", "@id":"4257799", "info":{"authors":{"author":{"@pid":"36/386","text":"Thabet Slimani"}},"title":"Description and Evaluation of Semantic Similarity Measures Approaches.","venue":"CoRR","volume":"abs/1310.8059","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Slimani13a","ee":"http://arxiv.org/abs/1310.8059","url":"https://dblp.org/rec/journals/corr/Slimani13a"}, "url":"URL#4257799" }, { "@score":"1", "@id":"4257814", "info":{"authors":{"author":{"@pid":"58/1792","text":"Benjamin Smith 0003"}},"title":"Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians.","venue":"CoRR","volume":"abs/1310.5250","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/Smith13c","ee":"http://arxiv.org/abs/1310.5250","url":"https://dblp.org/rec/journals/corr/Smith13c"}, "url":"URL#4257814" }, { "@score":"1", "@id":"4257823", "info":{"authors":{"author":[{"@pid":"133/8494","text":"Stanislav Sobolevsky"},{"@pid":"84/10671","text":"Michael Szell"},{"@pid":"133/8444","text":"Riccardo Campari"},{"@pid":"34/8344","text":"Thomas Couronné"},{"@pid":"46/8344","text":"Zbigniew Smoreda"},{"@pid":"00/5561","text":"Carlo Ratti"}]},"title":"Delineating geographical regions with networks of human interactions in an extensive set of countries.","venue":"CoRR","volume":"abs/1310.1829","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SobolevskySCCSR13","ee":"http://arxiv.org/abs/1310.1829","url":"https://dblp.org/rec/journals/corr/SobolevskySCCSR13"}, "url":"URL#4257823" }, { "@score":"1", "@id":"4257833", "info":{"authors":{"author":[{"@pid":"79/3530","text":"Thamar Solorio"},{"@pid":"h/RagibHasan","text":"Ragib Hasan"},{"@pid":"136/5414","text":"Mainul Mizan"}]},"title":"Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities.","venue":"CoRR","volume":"abs/1310.6772","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SolorioHM13","ee":"http://arxiv.org/abs/1310.6772","url":"https://dblp.org/rec/journals/corr/SolorioHM13"}, "url":"URL#4257833" }, { "@score":"1", "@id":"4257846", "info":{"authors":{"author":[{"@pid":"135/6184","text":"Chao-Bing Song"},{"@pid":"34/3173","text":"Shu-Tao Xia"}]},"title":"New bounds Under Restricted Isometry for the exact k-sparse recovery via ℓq minimization.","venue":"CoRR","volume":"abs/1310.2410","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SongX13","ee":"http://arxiv.org/abs/1310.2410","url":"https://dblp.org/rec/journals/corr/SongX13"}, "url":"URL#4257846" }, { "@score":"1", "@id":"4257858", "info":{"authors":{"author":[{"@pid":"01/3386","text":"Safeeullah Soomro"},{"@pid":"117/3654","text":"Adnan Alam Khan"},{"@pid":"135/6153","text":"Abdul Ghafoor Memon"},{"@pid":"136/5673","text":"Asim Iftikhar"},{"@pid":"56/2236","text":"Maree Mujeeb-u-Rehman"}]},"title":"An Operational Approach For Wimax At Ultra High Bandwidth With Spectrum 60 Ghz.","venue":"CoRR","volume":"abs/1310.5794","year":"2013","type":"Informal and Other Publications","access":"open","key":"journals/corr/SoomroKMIM13","ee":"http://arxiv.org/abs/1310.5794","url":"https://dblp.org/rec/journals/corr/SoomroKMIM13"}, "url":"URL#4257858" } ] } } } )