![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
CoRR, June 2005
- Dmitry Mogilevsky, Sean Keller:
SafeMPI - Extending MPI for Byzantine Error Detection on Parallel Clusters. - Angela Bonifati, Elaine Qing Chang, Terence Ho, Laks V. S. Lakshmanan:
HepToX: Heterogeneous Peer to Peer XML Databases. - Andrea Pasquinucci:
Authentication and routing in simple Quantum Key Distribution networks. - Vladimir Vovk:
Non-asymptotic calibration and resolution. - Neng-Fa Zhou:
Programming Finite-Domain Constraint Propagators in Action Rules. - Nicolas Capit, Georges Da Costa, Yiannis Georgiou, Guillaume Huard, Cyrille Martin, Grégory Mounié, Pierre Neyron, Olivier Richard:
A batch scheduler with high level components. - Vladimir Vovk, Ilia Nouretdinov, Akimichi Takemura, Glenn Shafer:
Defensive forecasting for linear protocols. - Felix Klaedtke:
Bounds on the Automata Size for Presburger Arithmetic. - A. S. Madhu, Priti Shankar:
Approximate MAP Decoding on Tail-Biting Trellises. - Simeon Warner:
The OAI Data-Provider Registration and Validation Service. - Peter Sin, Qing Xiang:
On the dimensions of certain LDPC codes based on q-regular bipartite graphs. - Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz:
A Non-Cooperative Power Control Game in Delay-Constrained Multiple-Access Networks. - Prakash Ishwar, Pierre Moulin:
On the existence and characterization of the maxent distribution under general moment inequality constraints. - Joost Engelfriet, Sebastian Maneth:
The Equivalence Problem for Deterministic MSO Tree Transducers is Decidable. - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems. - Travis Gagie:
Compressing Probability Distributions. - Nizar Messai, Marie-Dominique Devignes, Malika Smaïl-Tabbone, Amedeo Napoli:
Treillis de concepts et ontologies pour l'interrogation d'un annuaire de sources de données biologiques (BioRegistry). - Kambiz Azarian, Hesham El Gamal, Philip Schniter:
On the Achievable Diversity-Multiplexing Tradeoffs in Half-Duplex Cooperative Channels. - Vicky Choi, Navin Goyal:
An Efficient Approximation Algorithm for Point Pattern Matching Under Noise. - Praveen Kumar Gopala, Hesham El Gamal:
On the Throughput-Delay Tradeoff in Cellular Multicast. - Rajgopal Kannan, Shuangqing Wei:
Analysis of Relationship between Strategic and Aggregate Energy Minimization in Delay-Constrained Wireless Networks. - Jan Poland, Marcus Hutter:
Asymptotics of Discrete MDL for Online Prediction. - Onureena Banerjee, Alexandre d'Aspremont, Laurent El Ghaoui:
Sparse Covariance Selection via Robust Maximum Likelihood Estimation. - Marko A. Rodriguez:
The Hyper-Cortex of Human Collective-Intelligence Systems. - Travis Gagie:
Dynamic Asymmetric Communication. - Rada Chirkova, Michael R. Genesereth:
Database Reformulation with Integrity Constraints (extended abstract). - Travis Gagie:
Sorting a Low-Entropy Sequence. - Youngchul Sung, Lang Tong, H. Vincent Poor:
Neyman-Pearson Detection of Gauss-Markov Signals in Noise: Closed-Form Error Exponent and Properties. - Arul D. Murugan, Hesham El Gamal, Mohamed Oussama Damen, Giuseppe Caire:
A Unified Framework for Tree Search Decoding : Rediscovering the Sequential Decoder. - Jonathan Ben-Naim:
Preferential and Preferential-discriminative Consequence relations. - Patrick Albert, Laurent Henocque, Mathias Kleiner:
A Constrained Object Model for Configuration Based Workflow Composition. - R. Shankar:
Framework for Hopfield Network based Adaptive routing - A design level approach for adaptive routing phenomena with Artificial Neural Network. - Reno Filla:
An Event-driven Operator Model for Dynamic Simulation of Construction Machinery. - Srikumar Venugopal, Rajkumar Buyya, Kotagiri Ramamohanarao:
A Taxonomy of Data Grids for Distributed Data Sharing, Management and Processing. - Jerome Collin, Michel R. Dagenais:
Fast Recompilation of Object Oriented Modules. - Marco Dalai, Riccardo Leonardi:
Non prefix-free codes for constrained sequences. - Sriram N. Kizhakkemadam, Panos Papamichalis, Mandyam D. Srinath, Dinesh Rajan:
Tradeoff Between Source and Channel Coding for Erasure Channels. - Wen Ding, William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market. - Weijun Zhu, Heechoon Lee, Daniel N. Liu, Michael P. Fitz:
Antenna array geometry and coding performance. - Jie Liu, Sheng Bao, Zhiqiang Jing, Shi Chen:
A Fixed-Length Coding Algorithm for DNA Sequence Compression. - Vladimir Vovk:
Competitive on-line learning with a convex loss function. - Deepak Sridhara, Christine A. Kelley, Joachim Rosenthal:
Tree-Based Construction of LDPC Codes. - Krishna R. Narayanan, Kapil Bhattad:
A Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Kapil Bhattad, Niranjan Ratnakar, Ralf Koetter, Krishna R. Narayanan:
Minimal Network Coding for Multicast. - Krishna R. Narayanan, Kapil Bhattad:
Decision Feedback Based Scheme for Slepian-Wolf Coding of sources with Hidden Markov Correlation. - Bernard Jacquemin:
Dictionaries merger for text expansion in question answering. - Bernard Jacquemin:
Analyse et expansion des textes en question-réponse. - Bernard Jacquemin, Caroline Brun, Claude Roux:
Enriching a Text by Semantic Disambiguation for Information Extraction. - Caroline Brun, Bernard Jacquemin, Frédérique Segond:
Exploitation de dictionnaires électroniques pour la désambiguïsation sémantique lexicale. - Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann:
The Workshop - Implementing Well Structured Enterprise Applications. - Heiko Herrmann, Gunnar Rueckner:
Comparison of two different implementations of a finite-difference-method for first-order pde in mathematica and matlab. - Vignesh Sethuraman, Bruce E. Hajek:
Comments on 'Bit Interleaved Coded Modulation'. - Hongyuan Zhang, Huaiyu Dai, Quan Zhou, Brian L. Hughes:
Analysis on Transmit Antenna Selection for Spatial Multiplexing Systems: A Geometrical Approach. - Ramesh Johari, Shie Mannor, John N. Tsitsiklis:
Efficiency Loss in a Network Resource Allocation Game: The Case of Elastic Supply. - Edith Hemaspaandra, Lane A. Hemaspaandra, Osamu Watanabe:
The Complexity of Kings. - Travis Gagie:
Large Alphabets and Incompressibility. - Victor Kromer:
About one 3-parameter Model of Testing. - Kapil Bhattad, Krishna R. Narayanan:
An MSE Based Ttransfer Chart to Analyze Iterative Decoding Schemes. - Hubie Chen:
Existentially Restricted Quantified Constraint Satisfaction. - Yong Luo:
Yet another normalisation proof for Martin-Lof's logical framework--Terms with correct arities are strongly normalising. - Daniele Gorla, Matthew Hennessy, Vladimiro Sassone:
Security Policies as Membranes in Systems for Global Computing. - Yoshiyuki Kabashima:
A CDMA multiuser detection algorithm based on survey propagation. - Slawomir Staworko, Jan Chomicki:
Priority-Based Conflict Resolution in Inconsistent Relational Databases. - Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. - Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. - Yoo Chung, Dongman Lee:
Impersonation with the Echo Protocol. - Juan José Amor, Gregorio Robles, Jesús M. González-Barahona:
Measuring Woody: The Size of Debian 3.0. - Chris Marriott, John Watrous:
Quantum Arthur-Merlin Games. - Rémi Monasson:
A generating function method for the average-case analysis of DPLL. - Yuriy A. Chashkov:
Data Visualization on Shared Usage Multi-Screen Environment. - Yu. Reznykov:
Signal transmission on lossy lines as a dissipative quantum state propagation. - Jing Jiang, Krishna R. Narayanan:
Performance Analysis of Algebraic Soft Decoding of Reed-Solomon Codes over Binary Symmetric and Erasure Channels. - Jing Jiang, Krishna R. Narayanan:
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix. - Paolo Liberatore:
Redundancy in Logic II: 2CNF and Horn Propositional Formulae. - Bo Pang, Lillian Lee:
Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales. - Wojciech Mazurczyk, Zbigniew Kotulski
:
Alternative security architecture for IP Telephony based on digital watermarking. - K. C. V. Kalyanarama Sesha Sayee, Utpal Mukherji:
Stability of Scheduled Multi-access Communication over Quasi-static Flat Fading Channels with Random Coding and Independent Decoding. - David R. C. Dominguez, Kostadin Koroutchev, Eduardo Serrano, Francisco de Borja Rodríguez Ortiz:
Dynamical Neural Network: Information and Topology. - Ugo Dal Lago, Martin Hofmann:
Quantitative Models and Implicit Complexity. - Ugo Dal Lago:
The Geometry of Linear Higher-Order Recursion. - Gatis Midrijanis:
Three lines proof of the lower bound for the matrix rigidity. - Piotr Faliszewski, Lane A. Hemaspaandra:
Open Questions in the Theory of Semifeasible Computation. - Cyril Measson, Andrea Montanari, Rüdiger L. Urbanke:
Maxwell Construction: The Hidden Bridge between Iterative and Maximum a Posteriori Decoding. - Jason E. Holt:
The One Page Model Checker. - Jason E. Holt:
On the Job Training. - Sudharman K. Jayaweera:
Large System Decentralized Detection Performance Under Communication Constraints. - Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu:
Primal-dual distance bounds of linear codes with application to cryptography. - (Withdrawn) An Alternative to Huffman's Algorithm for Constructing Variable-Length Codes.
- Patrick C. McGuire, Javier Gómez-Elvira, José Antonio Rodríguez Manfredi, Eduardo Sebastián-Martínez, Jens Ormö, Enrique Díaz Martínez, Markus Oesker, Robert Haschke, Jörg Ontrup, Helge J. Ritter:
Field geology with a wearable computer: 1st results of the Cyborg Astrobiologist System. - Tobias Riege, Jörg Rothe:
An Exact 2.9416n Algorithm for the Three Domatic Number Problem. - Oscar Y. Takeshita:
A New Construction for LDPC Codes using Permutation Polynomials over Integer Rings. - Thomas Lux:
Emergent Statistical Wealth Distributions in Simple Monetary Exchange Models: A Critical Review. - Oscar Y. Takeshita:
On Maximum Contention-Free Interleavers and Permutation Polynomials over Integer Rings. - Boris Ryabko, Jaakko Astola:
Universal Codes as a Basis for Nonparametric Testing of Serial Independence for Time Series. - Yi-Dong Shen, Qiang Yang, Jia-Huai You, Li-Yan Yuan:
Deriving a Stationary Dynamic Bayesian Network from a Logic Program with Recursive Loops. - Nicolas Baudru, Rémi Morin:
Polynomial Synthesis of Asynchronous Automata. - Samuel Thibault:
A Flexible Thread Scheduler for Hierarchical Multiprocessor Machines. - Petra Berenbrink, Tom Friedetzky, Leslie Ann Goldberg, Paul W. Goldberg, Zengjian Hu, Russell A. Martin:
Distributed Selfish Load Balancing. - Yuval Shavitt, Eran Shir:
DIMES: Let the Internet Measure Itself. - Jirí Síma, Satu Elisa Schaeffer:
On the NP-Completeness of Some Graph Cluster Measures. - Patrick Haffner, Steven J. Phillips, Robert E. Schapire:
Efficient Multiclass Implementations of L1-Regularized Maximum Entropy. - John Little, Ryan Schwarz:
On m-dimensional toric codes. - Aneta Zwierko, Zbigniew Kotulski
:
Security of mobile agents: a new concept of the integrity protection. - Zbigniew Lonc, Miroslaw Truszczynski:
Computing minimal models, stable models and answer sets. - Ren-Chiun Wang, Chou Chen Yang, Kun-Ru Mo:
A protected password change protocol. - Milan M. Cirkovic, Robert J. Bradbury:
Galactic Gradients, Postbiological Evolution and the Apparent Failure of SETI. - Sergey N. Dorogovtsev, Alexander V. Goltsev, J. F. F. Mendes:
Correlations in interacting systems with a network topology. - Mikhail G. Stepanov, Vladimir Y. Chernyak, Michael Chertkov, Bane Vasic:
Diagnosis of weaknesses in modern error correction codes: a physics approach. - Hervé Daudé, Marc Mézard, Thierry Mora, Riccardo Zecchina:
Pairs of SAT Assignment in Random Boolean Formulae. - L. Bogacz, Zdzislaw Burda, Wolfhard Janke, Bartlomiej Waclaw:
A program generating homogeneous random graphs with given weights. - Stefano Ciliberti, Marc Mézard:
The theoretical capacity of the Parity Source Coder. - Naoto Morikawa:
Discrete differential geometry of proteins: a new method for encoding three-dimensional structures of proteins. - Dimitri Grigoriev, Ilia N. Ponomarenko:
Constructions in public-key cryptography over matrix groups. - Radhakrishnan Srinivasan, H. P. Raghunandan:
Foundations of real analysis and computability theory in non-Aristotelian finitary logic. - Anne Micheli, Dominique Rossin:
Edit Distance between Unlabeled Ordered Trees. - Hugues Berry, Daniel Gracia Pérez, Olivier Temam:
Chaos in computer performance. - Bruno Cessac, Jacques-A. Sepulchre:
Transmitting a signal by amplitude modulation in a chaotic network. - Paolo Luchini, Maurizio Quadrio:
A low-cost parallel implementation of direct numerical simulation of wall turbulence. - Fabio Benatti, Tyll Krueger, Markus Müller, Rainer Siegmund-Schultze, Arleta Szkola:
Entropy and Quantum Kolmogorov Complexity: A Quantum Brudno's Theorem. - Wenjin Mao:
Solving Satisfiability Problems by the Ground-State Quantum Computer. - Claus-Jochen Haake, Akemi Kashiwada, Francis Edward Su:
The Shapley Value of Phylogenetic Trees. - Giorgi Japaridze:
Introduction to Cirquent Calculus and Abstract Resource Semantics. - Jason D. McEwen, Michael P. Hobson, Daniel J. Mortlock, Anthony N. Lasenby:
Fast directional continuous spherical wavelet transform algorithms.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.