default search action
CoRR, September 2010
- Dimitrios Panagopoulos:
A secret sharing scheme using groups. - Xin Liu, Xiaowei Yang, Yong Xia:
NetFence: Preventing Internet Denial of Service from Inside Out. - David Eppstein, Maarten Löffler, Elena Mumford, Martin Nöllenburg:
Optimal 3D Angular Resolution for Low-Degree Graphs. - Boyu Li, Ender Ayanoglu:
Golden Coded Multiple Beamforming. - Gokarna Sharma, Costas Busch:
A Competitive Analysis for Balanced Transactional Memory Workloads. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang, Ying Wang:
Joint Uplink and Downlink Relay Selection in Cooperative Cellular Networks. - Wei Yang, Lihua Li, Gang Wu, Haifeng Wang:
Joint Relay Selection and Link Adaptation for Distributed Beamforming in Regenerative Cooperative Networks. - (Withdrawn) Energy-Efficient Transmission Schemes in Cooperative Cellular Systems.
- Emanuel Diamant:
Not only a lack of right definitions: Arguments for a shift in information-processing paradigm. - Wei Yang, Lihua Li, Wanlu Sun:
Energy-Efficient Relay Selection and Optimal Relay Location in Cooperative Cellular Networks with Asymmetric Traffic. - Erin W. Chambers, David Eppstein, Michael T. Goodrich, Maarten Löffler:
Drawing Graphs in the Plane with a Prescribed Outer Face and Polynomial Area. - Arslan Shaukat, Ke Chen:
Emotional State Categorization from Speech: Machine vs. Human. - Arslan Shaukat, Ke Chen:
Exploring Language-Independent Emotional Acoustic Features via Feature Selection. - Telmo L. T. Menezes, Camille Roth, Jean-Philippe Cointet:
Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network. - Philippe Chassaing, Jean Mairesse:
A non-ergodic PCA with a unique invariant measure. - Amnon H. Eden, Epameinondas Gasparis:
Three Controlled Experiments in Software Engineering with the Two-Tier Programming Toolkit: Final Report. - Rémy Belmonte, Martin Vatshelle:
On graph classes with logarithmic boolean-width. - Wei Pan, Manuel Cebrián, Wen Dong, Taemie Kim, Alex Pentland:
Modeling Dynamical Influence in Human Interaction Patterns. - Ketan Mulmuley:
Explicit Proofs and The Flip. - Flavio Rizzolo, Iluju Kiringa, Rachel Pottinger, Kwok Wong:
The Conceptual Integration Modeling Framework: Abstracting from the Multidimensional Model. - Marián Boguñá, Fragkiskos Papadopoulos, Dmitri V. Krioukov:
Sustaining the Internet with Hyperbolic Mapping. - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss analysis of thresholded authentication protocols in noisy conditions. - Maxim Raginsky:
Empirical processes, typical sequences and coordinated actions in standard Borel spaces. - Edith Elkind, Piotr Faliszewski, Arkadii M. Slinko:
Rationalizations of Condorcet-Consistent Rules via Distances of Hamming Type. - Yu-Chih Huang, Krishna R. Narayanan:
Joint Source-Channel Coding with Correlated Interference. - Sleiman Rabah, Jiang Li, Mingzhi Liu, Yuanwei Lai:
Comparative Studies of 10 Programming Languages within 10 Diverse Criteria -- a Team 7 COMP6411-S10 Term Report. - Jun Liu, Jieping Ye:
Fast Overlapping Group Lasso. - Xi Chen, Shang-Hua Teng:
A Complexity View of Markets with Social Influence. - Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, Mark G. Wallace:
Solving the Resource Constrained Project Scheduling Problem with Generalized Precedences by Lazy Clause Generation. - Tomás Feder, Pavol Hell, David G. Schell, Juraj Stacho:
Dichotomy for tree-structured trigraph list homomorphism problems. - Sandeep Singh Rawat, Lakshmi Rajamani:
Discovering potential user browsing behaviors using custom-built apriori algorithm. - V. I. Ilyevsky:
The concept of an order and its application for research of the deterministic chains of symbols. - Tansu Alpcan, Holger Boche, Siddharth Naik:
A Unified Mechanism Design Framework for Networked Systems. - Rahmat Widia Sembiring, Jasni Mohamad Zain, Abdullah Embong:
Clustering high dimensional data using subspace and projected clustering algorithms. - Hussein Al-Bahadili, Khalid Kaabneh:
Analyzing the performance of probabilistic algorithm in noisy manets. - Hussein Al-Bahadili, Rami Jaradat:
Performance Evaluation of an OMPR Algorithm for Route Discovery in Noisy MANETs. - Khalid Nawaz, Alejandro P. Buchmann:
Acdmcp: An adaptive and completely distributed multi-hop clustering protocol for wireless sensor networks. - Nazim Burak Karahanoglu, Hakan Erdogan:
A* Orthogonal Matching Pursuit: Best-First Search for Compressed Sensing Signal Recovery. - Wided Oueslati, Jalel Akaichi:
Mobile Information Collectors' Trajectory Data Warehouse Design. - Murat Kayri, Ozlem Cakir:
An Applied Study on Educational Use of Facebook as a Web 2.0 Tool: The Sample Lesson of Computer Networks and Communication. - Thanasis Balafoutis, Anastasia Paparrizou, Kostas Stergiou:
Experimental Evaluation of Branching Schemes for the CSP. - Yuan Liu, Meixia Tao, Bin Li, Hui Shen:
Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks. - Dipa Dixit, Jayant Gadge:
Automatic Recommendation for Online Users Using Web Usage Mining. - Albert Sunny, Joy Kuri, Saurabh Aggarwal:
Delay Modelling for a Single-hop Wireless Mesh Network under Light Aggregate Traffic. - Fabien Tencé, Cédric Buche, Pierre De Loor, Olivier Marc:
The Challenge of Believability in Video Games: Definitions, Agents Models and Imitation Learning. - Yevgeny Seldin:
A PAC-Bayesian Analysis of Graph Clustering and Pairwise Clustering. - Fabien Tencé, Cédric Buche:
Automatable Evaluation Method Oriented toward Behaviour Believability for Video Games. - Jeffrey G. Andrews, François Baccelli, Radha Krishna Ganti:
A Tractable Approach to Coverage and Rate in Cellular Networks. - Omid David-Tabibi, Moshe Koppel, Nathan S. Netanyahu:
Optimizing Selective Search in Chess. - Rahul Srivastava, Can Emre Koksal:
Basic Tradeoffs for Energy Management in Rechargeable Sensor Networks. - Zhiheng Zhou, Liang Zhou, Xing Wang, Yuanquan Tan:
Encoded packet-Assisted Rescue Approach to Reliable Unicast in Wireless Networks. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:
Lombardi Drawings of Graphs. - Christian A. Duncan, David Eppstein, Michael T. Goodrich, Stephen G. Kobourov, Martin Nöllenburg:
Drawing Trees with Perfect Angular Resolution and Polynomial Area. - P. Samundiswary, D. Sathian, Perumal Dananjayan:
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks. - Louis Dorard, John Shawe-Taylor:
Gaussian Process Bandits for Tree Search. - Alessandro Nordio, Carla-Fabiana Chiasserini:
Field Reconstruction in Sensor Networks with Coverage Holes and Packet Losses. - Sakthivel Subramaniam, R. Lakshmipathi:
Weighted Attribute Fusion Model for Face Recognition. - Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, Mrinal Kanti Ghose:
Power-efficient Routing & Increased Yield Approach For WSNs. - Nikolai T. Stoianov, Veselina Aleksandrova:
The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem). - Marko A. Rodriguez, Jennifer H. Watkins:
Grammar-Based Geodesics in Semantic Networks. - Carsten Ihlemann, Viorica Sofronie-Stokkermans:
System Description: H-PILoT (Version 1.9). - Andreas Kendziorra, Stefan E. Schmidt:
Network coding with modular lattices. - Amir Daneshgar, Ramin Javadi:
On Complexity of Isoperimetric Problems on Trees. - Felix Krahmer, Rachel A. Ward:
New and improved Johnson-Lindenstrauss embeddings via the Restricted Isometry Property. - David Eppstein, Michael T. Goodrich, Darren Strash, Lowell Trott:
Extended h-Index Parameterized Data Structures for Computing Dynamic Subgraph Statistics. - Charlie C. L. Wang, Yong Chen:
Layered Depth-Normal Images: a Sparse Implicit Representation of Solid Models. - Gerard Briscoe, Paolo Dini:
Towards Autopoietic Computing. - Geevarghese Philip, Venkatesh Raman, Yngve Villanger:
A Quartic Kernel for Pathwidth-One Vertex Deletion. - Jan Olaf Blech, Anton Hattendorf, Jia Huang:
Towards a Property Preserving Transformation from IEC 61131-3 to BIP. - Hamed khataeimaragheh, Hassan Rashidi:
A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables. - Jin-Li Guo:
Empirical study and modeling of human behaviour dynamics of comments on Blog posts. - Sajal Kabiraj, Vinay Topkar, R. C. Walke:
Going Green: A Holistic Approach to Transform Business. - M. Emre Celebi, Hassan A. Kingravi, Fatih Celiker:
Fast Color Space Transformations Using Minimax Approximations. - Mugurel Ionut Andreica, Andrei Dragus, Ana-Delia Sambotin, Nicolae Tapus:
Brief Announcement: Decentralized Construction of Multicast Trees Embedded into P2P Overlay Networks based on Virtual Geometric Coordinates. - R. Srikant:
Online Advertisement, Optimization and Stochastic Networks. - Han Xiao Wen:
Knowledge Recognition Algorithm enables P = NP. - Yongbin Zheng, Chunhua Shen, Richard I. Hartley, Xinsheng Huang:
Effective Pedestrian Detection Using Center-symmetric Local Binary/Trinary Patterns. - Farnood Merrikh-Bayat, Saeed Bagheri Shouraki:
Memristor Crossbar-based Hardware Implementation of Fuzzy Membership Functions. - Zvika Ben-Haim, Yonina C. Eldar:
Near-Oracle Performance of Greedy Block-Sparse Estimation Techniques from Noisy Measurements. - Bonnie Kirkpatrick, Yakir Reshef, Hilary K. Finucane, Haitao Jiang, Binhai Zhu, Richard M. Karp:
Algorithms for Comparing Pedigree Graphs. - Lorentz Jäntschi, Sorana D. Bolboaca, Mugur C. Balan, Radu E. Sestras:
Results of Evolution Supervised by Genetic Algorithms. - B. K. Pradeepa, Joy Kuri:
Aggregate AP Throughputs for Long File Transfers in a WLAN controlled by Inhomogeneous TCP Connections. - Zhiheng Zhou, Liang Zhou, Yuanquan Tan, Xing Wang:
An Efficient Retransmission Based on Network Coding with Unicast Flows. - Ammar Adl, Amr Badr, Ibrahim Farag:
A Note on the Membrane Computer. - Hao-En Chueh:
Mining Target-Oriented Sequential Patterns with Time-Intervals. - M. Emre Celebi:
Distance Measures for Reduced Ordering Based Vector Filters. - M. Emre Celebi:
Real-Time Implementation of Order-Statistics Based Directional Filters. - M. Emre Celebi, Hassan A. Kingravi, Rastislav Lukac, Fatih Celiker:
Cost-Effective Implementation of Order-Statistics Based Vector Filters Using Minimax Approximations. - M. Emre Celebi, Hassan A. Kingravi, Bakhtiyar Uddin, Y. Alp Aslandogan:
A Fast Switching Filter for Impulsive Noise Removal from Color Images. - M. Emre Celebi, Hassan A. Kingravi, Y. Alp Aslandogan:
Nonlinear Vector Filtering for Impulsive Noise Removal from Color Images. - B. Kiran Kumar:
ETP-Mine: An Efficient Method for Mining Transitional Patterns. - M. Emre Celebi, Hitoshi Iyatomi, William V. Stoecker, Randy H. Moss, Harold S. Rabinovitz, Giuseppe Argenziano, H. Peter Soyer:
Automatic Detection of Blue-White Veil and Related Structures in Dermoscopy Images. - M. Emre Celebi, Gerald Schaefer, Hitoshi Iyatomi, William V. Stoecker, Joseph M. Malters, James M. Grichnik:
An Improved Objective Evaluation Measure for Border Detection in Dermoscopy Images. - Piotr Bania:
JIT Spraying and Mitigations. - Jérôme Leroux:
The General Vector Addition System Reachability Problem by Presburger Inductive Invariants. - José F. Fontanari:
Social interaction as a heuristic for combinatorial optimization problems. - Elsa Tolone, Stavroula Voyatzi, Christian Leclère:
Constructions définitoires des tables du Lexique-Grammaire. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering. - Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Design & Deploy Web 2.0 enable services over Next Generation Network Platform. - Yaniv Altshuler, Shlomi Dolev, Yuval Elovici:
Efficient Collaborative Application Monitoring Scheme for Mobile Networks. - Kenta Kasai, Tomoharu Awano, David Declercq, Charly Poulliat, Kohichi Sakaniwa:
Weight Distributions of Multi-Edge type LDPC Codes. - David I. Spivak:
Functorial Data Migration. - Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakirah Mohd Taib:
M-Learning: A New Paradigm of Learning Mathematics in Malaysia. - Toby Walsh:
Parameterized Complexity Results in Symmetry Breaking. - Peyman Razaghi, Giuseppe Caire:
Coarse Network Coding: A Simple Relay Strategy to Resolve Interference. - Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari:
E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks). - Elmar Böhler, Nadia Creignou, Matthias Galota, Steffen Reith, Henning Schnoor, Heribert Vollmer:
Boolean Circuits as a Data Structure for Boolean Functions: Efficient Algorithms and Hard Problems. - Dae San Kim:
A family of sequences with large size and good correlation property arising from $M$-ary Sidelnikov sequences of period $q^d-1$. - Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas:
Multiuser broadcast erasure channel with feedback - capacity and algorithms. - Moshe Mishali, Yonina C. Eldar:
Wideband Spectrum Sensing at Sub-Nyquist Rates. - Jean-Guillaume Dumas, Thierry Gautier, Clément Pernet, B. David Saunders:
LinBox founding scope allocation, parallel building blocks, and separate compilation. - Gabrielle Allen, Tom Goodale, Frank Löffler, David Rideout, Erik Schnetter, Eric L. Seidel:
Component Specification in the Cactus Framework: The Cactus Configuration Language. - Eric L. Seidel, Gabrielle Allen, Steven R. Brandt, Frank Löffler, Erik Schnetter:
Simplifying Complex Software Assembly: The Component Retrieval Language and Implementation. - László Toka, Matteo Dell'Amico, Pietro Michiardi:
On Scheduling and Redundancy for P2P Backup. - M. Emre Celebi, Hitoshi Iyatomi, Gerald Schaefer, William V. Stoecker:
Approximate Lesion Localization in Dermoscopy Images. - Akitoshi Kawamura:
Generalized Semimagic Squares for Digital Halftoning. - Serge Gaspers, Mathieu Liedloff:
A Branch-and-Reduce Algorithm for Finding a Minimum Independent Dominating Set. - Thomas Lemon, Ewen Ferguson:
A Practical Approach to Managing Spreadsheet Risk in a Global Business. - Sebastian Dewhurst:
Transforming Critical Spreadsheets into Web Applications at Zurich Financial. - Patrick O'Beirne:
Spreadsheet Refactoring. - Rahul Vaze, Kien T. Truong, Steven Weber, Robert W. Heath Jr.:
Two-Way Transmission Capacity of Wireless Ad-hoc Networks. - Alkim Almila Akdag Salah, Loet Leydesdorff:
The Development of the Journal Environment of Leonardo. - A. Saradha Devi, S. Suja Priyadharsini, S. Athinarayanan:
A Block Based Scheme for Enhancing Low Luminated Images. - Christine Bachoc:
Applications of semidefinite programming to coding theory. - Onay Urfalioglu, Orhan Arikan:
Artificial Neural Networks, Symmetries and Differential Evolution. - Dhruv Srivastava, Priya Ranjan:
An Application-oriented Model for Wireless Sensor Networks integrated with Telecom Infra. - Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Eldar:
Sensing Matrix Optimization for Block-Sparse Decoding. - Darakhshan J. Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright:
Pan-private Algorithms: When Memory Does Not Help. - Christopher Earl, Matthew Might, David Van Horn:
Stack-Summarizing Control-Flow Analysis of Higher-Order Programs. - Julien Ferté, Vincent Pilaud, Michel Pocchiola:
On the number of simple arrangements of five double pseudolines. - JeongGil Ko, Amitabh Mishra:
DynaChanAl: Dynamic Channel Allocation with Minimal End-to-end Delay for Wireless Sensor Networks. - Sabu M. Thampi, K. Chandra Sekaran:
Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks. - Ajay Sridharan, Yong Gao, Kui Wu, James Nastos:
Statistical Behavior of Embeddedness and Communities of Overlapping Cliques in Online Social Networks. - Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh:
Probabilistic Models over Ordered Partitions with Application in Learning to Rank. - Oleg Titov:
One method of storing information. - George C. Violaris, Constandinos X. Mavromoustakis:
On the Performance Evaluation and Analysis of the Hybridised Bittorrent Protocol with Partial Mobility Characteristics. - Constandinos X. Mavromoustakis:
On the Impact of Caching and a Model for Storage-Capacity Measurements for Energy Conservation in Asymmetrical Wireless Devices. - Girish Varma:
Conductance and Eigenvalue. - Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. - M. Kamaraju, K. Lal Kishore, A. V. N. Tilak:
Power optimized programmable embedded controller. - William Lovas, Frank Pfenning:
Refinement Types for Logical Frameworks and Their Interpretation as Proof Irrelevance. - Mark de Berg, Krzysztof Onak, Anastasios Sidiropoulos:
Fat Polygonal Partitions with Applications to Visualization and Embeddings.