


Остановите войну!
for scientists:


default search action
CoRR, April 2008
- Mihailo Stojnic, Farzad Parvaresh, Babak Hassibi:
On the reconstruction of block-sparse signals with an optimal number of measurements. - Nick Letzepis, Albert Guillen i Fabregas:
Outage Probability of the Gaussian MIMO Free-Space Optical Channel with PPM. - Kevin Henshall, Peter Schachte, Harald Søndergaard
, Leigh Whiting:
Binary Decision Diagrams for Affine Approximation. - Jaap-Henk Hoepman:
Private Handshakes. - Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski
, Radu Lupu, Wojciech Mazurczyk:
SecMon: End-to-End Quality and Security Monitoring System. - Benoît Lemaire, Guy Denhière:
Effects of High-Order Co-occurrences on Word Semantic Similarities. - Bruno Gaume, Fabien Mathieu:
From Random Graph to Small World by Wandering. - Ronny Luss, Alexandre d'Aspremont:
Support Vector Machine Classification with Indefinite Kernels. - Alwen Tiu, Rajeev Goré:
A proof theoretic analysis of intruder theories. - Marko A. Rodriguez:
Mapping Semantic Networks to Undirected Networks. - Maurice H. T. Ling, Christophe Lefèvre, Kevin R. Nicholas:
Parts-of-Speech Tagger Errors Do Not Necessarily Degrade Accuracy in Extracting Information from Biomedical Text. - Tobias Kretz, Michael Schreckenberg:
Moore and more and symmetry. - Raphael Hunger, Michael Joham:
On the Convexity of the MSE Region of Single-Antenna Users. - Mostafa Sharifzadeh, Hamed Owladeghaffari, Kourosh Shahriar, E. Bakhtavar:
Permeability Analysis based on information granulation theory. - Hamed Owladeghaffari, Kourosh Shahriar, Witold Pedrycz:
Graphical Estimation of Permeability Using RST&NFIS. - Patrick Chénais:
Merging Object and Process Diagrams for Business Information Modeling. - Lalitha Sankar, Narayan B. Mandayam, H. Vincent Poor:
On the Sum-Capacity of Degraded Gaussian Multiaccess Relay Channels. - Adam Kasperski, Pawel Zielinski:
On the approximability of minmax (regret) network optimization problems. - Ayoub Otmani, Jean-Pierre Tillich, Léonard Dallot:
Cryptanalysis of Two McEliece Cryptosystems Based on Quasi-Cyclic Codes. - Wei Dai, Brian Rider, Youjian Liu:
Joint Beamforming for Multiaccess MIMO Systems with Finite Rate Feedback. - Gesualdo Scutari, Sergio Barbarossa:
Distributed Consensus over Wireless Sensor Networks Affected by Multipath Fading. - Daniil Ryabko, Boris Ryabko:
Testing Statistical Hypotheses About Ergodic Processes. - Jingpeng Li, Uwe Aickelin:
Bayesian Optimisation Algorithm for Nurse Scheduling. - Hamed Owladeghaffari, Majid Ejtemaei, Mehdi Irannajad:
Application of Rough Set Theory to Analysis of Hydrocyclone Operation. - Ghassan M. Kraidy, Valentin Savin:
Irregular turbo code design for the binary erasure channel. - Géry Casiez, Daniel Vogel, Qing Pan, Christophe Chaillou:
RubberEdge: Reducing Clutching by Combining Position and Rate Control with Elastic Feedback. - Fahem Kebair, Frédéric Serin, Cyrille Bertelle:
Agent-Based Perception of an Environment in an Emergency Situation. - Christian Duriez, Frédéric Dubois, Abderrahmane Kheddar, Claude Andriot:
Realistic Haptic Rendering of Interacting Deformable Objects in Virtual Environments. - Jianer Chen, Henning Fernau, Dan Ning, Daniel Raible, Jianxin Wang:
A Parameterized Perspective on P2-Packings. - Tom Morrison, Uwe Aickelin:
An Artificial Immune System as a Recommender System for Web Sites. - Jingpeng Li, Uwe Aickelin:
Explicit Learning: an Effort towards Human Scheduling Algorithms. - Oliver Schütze, Carlos A. Coello Coello, Emilia Tantar
, El-Ghazali Talbi:
Computing a Finite Size Representation of the Set of Approximate Solutions of an MOP. - João Marques-Silva, Inês Lynce, Vasco M. Manquinho:
Symmetry Breaking for Maximum Satisfiability. - Hooman Shirani-Mehr, Giuseppe Caire:
Channel State Feedback Schemes for Multiuser MIMO-OFDM Downlink. - Urs Niesen, Devavrat Shah, Gregory W. Wornell:
Source Coding with Mismatched Distortion Measures. - Boris Skoric:
Steganography from weak cryptography. - Luca Roversi:
Weak Affine Light Typing is complete with respect to Safe Recursion on Notation. - Gregory Z. Gutin, Daniel Karapetyan:
A Memetic Algorithm for the Generalized Traveling Salesman Problem. - Gregory Z. Gutin, Daniel Karapetyan
:
Generalized Traveling Salesman Problem Reduction Algorithms. - Laurent Viennot, Yacine Boufkhad, Fabien Mathieu, Fabien de Montgolfier, Diego Perino:
Scalable Distributed Video-on-Demand: Theoretical Bounds and Practical Algorithms. - Siavash Ekbatani, Farzad Etemadi, Hamid Jafarkhani:
Outage behavior of slow fading channels with power control using noisy quantized CSIT. - Raymond R. Panko, Nicholas Ordway:
Sarbanes-Oxley: What About all the Spreadsheets? - Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath Jr., Dongning Guo, Randall A. Berry:
Spatial Interference Cancelation for Mobile Ad Hoc Networks: Perfect CSI. - Namrata Vaswani:
Kalman Filtered Compressed Sensing. - David Simoncini, Philippe Collard, Sébastien Vérel, Manuel Clergue:
On the Influence of Selection Operators on Performances in Cellular Genetic Algorithms. - Mark Braverman:
On ad hoc routing with guaranteed delivery. - Andreas Abel:
Semi-continuous Sized Types and Termination. - Serban E. Vlad:
The equations of the ideal latches. - Ratthachat Chatpatanasiri:
Spectral Methods for Linear and Non-Linear Semi-Supervised Dimensionality Reduction. - Mark de Berg, Shripad Thite:
Cache-Oblivious Selection in Sorted X+Y Matrices. - Paula Jennings:
Issues in Strategic Decision Modelling. - Shripad Thite:
Optimum Binary Search Trees on the Hierarchical Memory Model. - Raymond R. Panko:
Reducing Overconfidence in Spreadsheet Development. - Shripad Thite:
Spacetime Meshing for Discontinuous Galerkin Methods. - Richard J. Irons:
The Wall and The Ball: A Study of Domain Referent Spreadsheet Errors. - Shripad Thite:
Efficient Spacetime Meshing with Nonlocal Cone Constraints. - Vikraman Arvind, Partha Mukhopadhyay:
Derandomizing the Isolation Lemma and Lower Bounds for Circuit Size. - Marie-Claude Gaudel, Pascale Le Gall
:
Testing data types implementations from algebraic specifications. - K. Vishnu Vardhan, Saif K. Mohammed, Ananthanarayanan Chockalingam, B. Sundar Rajan:
Large MIMO Detection: A Low-Complexity Detector at High Spectral Efficiencies. - Zachary Abel, David Charlton, Sébastien Collette, Erik D. Demaine, Martin L. Demaine, Stefan Langerman, Joseph O'Rourke, Val Pinciu, Godfried T. Toussaint:
Cauchy's Arm Lemma on a Growing Sphere. - Irina E. Bocharova, Rolf Johannesson, Boris D. Kudryashov, Victor V. Zyablov:
Woven Graph Codes: Asymptotic Performances and Examples. - Gilles Villard:
Differentiation of Kaltofen's division-free determinant algorithm. - Sviatlana Danilava, Christoph Schommer:
A Semi-Automatic Framework to Discover Epistemic Modalities in Scientific Articles. - Prosenjit Bose, Paz Carmi, Sébastien Collette, Michiel H. M. Smid:
On the Stretch Factor of Convex Delaunay Graphs. - Zhiqiang Xu, Guoliang Xu:
Discrete schemes for Gaussian curvature and their convergence. - Jerrald Meek:
P is a proper subset of NP. - Ambedkar Dukkipati:
Towards algebraic methods for maximum entropy estimation. - Olof Mogren, Oskar Sandberg, Vilhelm Verendel, Devdatt P. Dubhashi:
Adaptive Dynamics of Realistic Small-World Networks. - Yindi Jing, Hamid Jafarkhani:
Network Beamforming Using Relays with Perfect Channel Information. - Donald A. Sofge:
A Survey of Quantum Programming Languages: History, Methods, and Tools. - Donald A. Sofge:
Prospective Algorithms for Quantum Evolutionary Computation. - Satyaki Mahalanabis, Daniel Stefankovic:
Approximating L1-distances between mixture distributions using random projections. - Jaspreet Singh, Onkar Dabeer, Upamanyu Madhow:
Transceiver Design with Low-Precision Analog-to-Digital Conversion : An Information-Theoretic Perspective. - Peter Brass, Ferran Hurtado, Benjamin J. Lafreniere, Anna Lubiw:
A Lower Bound on the Area of a 3-Coloured Disk Packing. - Genta Ito:
A Dynamical Boolean Network. - Jun Muramatsu, Shigeki Miyake:
Hash Property and Fixed-rate Universal Coding Theorems. - Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong:
Securing U-Healthcare Sensor Networks using Public Key Based Scheme. - Al-Sakib Khan Pathan, Choong Seon Hong:
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards. - Marianne Viallet, Gérald Poumérol, Olivier Dessombz, Louis Jezequel:
Méthode de calcul du rayonnement acoustique de structures complexes. - Elchanan Zwecher, Dana Porrat:
Spreading Signals in the Wideband Limit. - Kazuhiko Kusano, Wataru Matsubara, Akira Ishino, Hideo Bannai, Ayumi Shinohara:
New Lower Bounds for the Maximum Number of Runs in a String. - Fionn Murtagh:
Geometric Data Analysis, From Correspondence Analysis to Structured Data Analysis (book review). - Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review. - Michel Grabisch, Bernard De Baets, János C. Fodor:
The quest for rings on bipolar scales. - Gianni Tedesco, Uwe Aickelin:
Data Reduction in Intrusion Alert Correlation. - Francis R. Bach:
Bolasso: model consistent Lasso estimation through the bootstrap. - Julien Cassaigne, Christian Mauduit, François Nicolas:
Asymptotic behavior of growth functions of D0L-systems. - Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor:
Interference-Assisted Secret Communication. - Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar, Guven Fidan:
Discovering More Accurate Frequent Web Usage Patterns. - Jason A. Covey, Christopher Homan:
A $O(\log m)$, deterministic, polynomial-time computable approximation of Lewis Carroll's scoring rule. - Marc de Falco:
The Geometry of Interaction of Differential Interaction Nets. - Pascal Koiran, Jürgen Landes, Natacha Portier, Penghui Yao:
Adversary lower bounds for nonadaptive quantum algorithms. - Ratthachat Chatpatanasiri, Teesid Korsrilabutr, Pasakorn Tangchanachaianan, Boonserm Kijsirikul:
On Kernelization of Supervised Mahalanobis Distance Learners. - Vincent Garcia, Eric Debreuve, Michel Barlaud:
Fast k Nearest Neighbor Search using GPU. - Maya Badr, Jean-Claude Belfiore:
Distributed Space-Time Block Codes for the MIMO Multiple Access Channel. - Maya Badr, Jean-Claude Belfiore:
Distributed Space Time Codes for the Amplify-and-Forward Multiple-Access Relay Channel. - Akisato Kimura, Tomohiko Uyematsu:
Multiterminal source coding with complementary delivery. - S. Sundhar Ram, Venugopal V. Veeravalli, Angelia Nedic:
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models. - Rui Zhang:
Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI. - Jaime Gutierrez, David Sevilla:
On decomposition of tame polynomials and rational functions. - André F. T. Martins, Pedro M. Q. Aguiar, Mário A. T. Figueiredo:
Nonextensive Generalizations of the Jensen-Shannon Divergence. - Christian Urban, James Cheney, Stefan Berghofer:
Mechanizing the Metatheory of LF. - Jaime Gutierrez, David Sevilla:
Computation of unirational fields. - Freddy Muñoz, Benoit Baudry, Olivier Barais:
A classification of invasive patterns in AOP. - Shrinivas Kudekar, Rüdiger L. Urbanke:
Lower Bounds on the Rate-Distortion Function of Individual LDGM Codes. - Jaime Gutierrez, David Sevilla:
Computation of unirational fields (extended abstract). - Sudipto Guha, Kamesh Munagala, Saswati Sarkar:
Information Acquisition and Exploitation in Multichannel Wireless Networks. - Roberto M. Amadio, Mehdi Dogguy:
On affine usages in signal-based communication. - Giuseppe Durisi, Ulrich G. Schuster, Helmut Bölcskei, Shlomo Shamai:
Noncoherent Capacity of Underspread Fading Channels. - Dieter Denneberg, Michel Grabisch:
Measure and integral with purely ordinal scales. - Michel Grabisch:
The Symmetric Sugeno Integral. - Christophe Labreuche, Michel Grabisch:
The Choquet integral for the aggregation of interval scales in multicriteria decision making. - Dariusz Dereniowski:
Phutball is PSPACE-hard. - Domingo Gómez-Pérez, Jaime Gutierrez, Álvar Ibeas, David Sevilla:
Prediciendo el generador cuadratico (in Spanish). - K. Raj Kumar, Giuseppe Caire:
Space-Time Codes from Structured Lattices. - Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal:
Necessary and Sufficient Conditions on Sparsity Pattern Recovery. - Aditya Ramamoorthy, Vwani P. Roychowdhury, Sudhir Kumar Singh:
Distributed Compression with Selfish Terminals: Correlation Induces Anarchy. - Ely Porat:
An Optimal Bloom Filter Replacement Based on Matrix Solving. - Robin Adams:
Lambda-Free Logical Frameworks. - Tobias Kretz, Michael Schreckenberg:
The F.A.S.T.-Model. - Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura:
A Reliability-based Framework for Multi-path Routing Analysis in Mobile Ad-Hoc Networks. - Michel Grabisch, Christophe Labreuche, Jean-Claude Vansnick:
On the Extension of Pseudo-Boolean Functions for the Aggregation of Interacting Criteria. - Robert Shour
:
Entropy and its relationship to allometry. - Chi-Anh La, Pietro Michiardi:
Characterizing User Mobility in Second Life. - Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, Marc Thurley:
A complexity dichotomy for partition functions with mixed signs. - Srikanth Chava:
A Security Protocol for Multi-User Authentication. - Gábor Ivanyos, Marek Karpinski, Nitin Saxena:
Schemes for Deterministic Polynomial Factoring. - Li Chen, Yongwu Rong:
Linear Time Recognition Algorithms for Topological Invariants in 3D. - Paul S. Bonsma, Frederic Dorn:
Tight Bounds and Faster Algorithms for Directed Max-Leaf Problems. - Serban E. Vlad:
The non-anticipation of the asynchronous systems. - Andrew Adamatzky:
Towards Physarum robots: computing and manipulating on water surface. - Serban E. Vlad:
Some properties of the regular asynchronous systems. - Tingrong Lu:
Analytical correlation of routing table length index and routing path length index in hierarchical routing model. - José R. Pérez-Agüera, Lourdes Araujo:
Comparing and Combining Methods for Automatic Query Expansion. - Shengli Zhang, Soung Chang Liew, Lu Lu:
Physical Layer Network Coding Over Finite And Infinite Fields. - Paul Tarau, Brenda Luderman:
A Logic Programming Framework for Combinational Circuit Synthesis. - Jason D. Hartline, Tim Roughgarden:
Optimal Mechansim Design and Money Burning. - Yossi Azar, Iftah Gamzu, Shai Gutner:
Truthful Unsplittable Flow for Large Capacity Networks. - Joseph Y. Halpern:
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic. - Alin Bostan, Frédéric Chyzak, Nicolas Le Roux:
Products of Ordinary Differential Operators by Evaluation and Interpolation. - Zouheir Rezki, David Haccoun, François Gagnon, Wessam Ajib:
Impact of Spatial Correlation on the Finite-SNR Diversity-Multiplexing Tradeoff. - Novella Bartolini, Tiziana Calamoneri, Emanuele G. Fusco, Annalisa Massini, Simone Silvestri:
Push&Pull: autonomous deployment of mobile sensors for a complete coverage. - Martin Haenggi:
The Secrecy Graph and Some of its Properties.