default search action
CoRR, October 2010
- Nam Yul Yu:
Deterministic Compressed Sensing Matrices from Additive Character Sequences. - James M. Coughlan, Huiying Shen:
An Embarrassingly Simple Speed-Up of Belief Propagation with Robust Potentials. - Byung-Gon Chun, Ling Huang, Sangmin Lee, Petros Maniatis, Mayur Naik:
Mantis: Predicting System Performance through Program Analysis and Modeling. - (Withdrawn) A stronger result on fractional strong colourings.
- Michael M. Zavlanos, Victor M. Preciado, Ali Jadbabaie:
Spectral Control of Mobile Robot Networks. - Wesam Gabran, Przemyslaw Pawelczak, Danijela Cabric:
Performance of Multi-Channel Multi-Stage Spectrum Sensing. - Mu-rong H. Wu:
A non-cooperative Pareto-efficient solution to a single-shot Prisoner's Dilemma. - Hironori Uchikawa, Kenta Kasai, Kohichi Sakaniwa:
Terminated LDPC Convolutional Codes over GF(2^p). - Michael Hartung, Anika Groß, Erhard Rahm:
Rule-based Generation of Diff Evolution Mappings between Ontology Versions. - Mithun Das Gupta, Sanjeev Kumar, Jing Xiao:
L1 Projections with Box Constraints. - Jørgen Villadsen, Niklas Skamriis Boss, Andreas Schmidt Jensen, Steen Vester:
Multi-Agent Programming Contest 2010 - The Jason-DTU Team. - Andreas Schmidt Jensen:
Implementing Lego Agents Using Jason. - Andreas Schmidt Jensen:
An Investigation of the Advantages of Organization-Centered Multi-Agent Systems. - Gerald Paul:
Comparative Performance of Tabu Search and Simulated Annealing Heuristics for the Quadratic Assignment Problem. - Mohammad Momani, Subhash Challa:
Survey of trust models in different network domains. - Massoud Masoumi:
A Novel and Highly Efficient AES Implementation Robust against Differential Power Analysis. - Alexandre J. Pierrot, Matthieu R. Bloch:
Strongly Secure Communications Over the Two-Way Wiretap Channel. - Yiwei Song, Natasha Devroye:
List decoding for nested lattices and applications to relay channels. - Beenish Anam, Kazi Sakib, M. Alamgir Hossain, Keshav P. Dahal:
Review on the Advancements of DNA Cryptography. - Nam Yul Yu:
Reed-Muller Codes for Peak Power Control in Multicarrier CDMA. - Yue Wang, Justin P. Coon:
Difference Antenna Selection and Power Allocation for Wireless Cognitive Systems. - Andrei A. Bulatov, Dániel Marx:
The complexity of global cardinality constraints. - Anthony Labarre, Josef Cibulka:
Polynomial-time sortable stacks of burnt pancakes. - Andreas Witzel:
Characterizing perfect recall in Epistemic Temporal Logic. - Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poor:
An Information-theoretic Approach to Privacy. - Kristina Lerman, Tad Hogg:
Using Stochastic Models to Describe and Predict Social Dynamics of Web Users. - Yeow Meng Chee, Xiande Zhang, Hui Zhang:
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order. - Rui Wang, Vincent K. N. Lau, Ying Cui:
Queue-Aware Distributive Resource Control for Delay-Sensitive Two-Hop MIMO Cooperative Systems. - Siby Abraham, Imre Kiss, Sugata Sanyal, Mukund A. Sanglikar:
Steepest Ascent Hill Climbing For A Mathematical Problem. - Anjan Kumar Kundu, Bijoy Bandyopadhyay, Sugata Sanyal:
A Microwave Imaging and Enhancement Technique from Noisy Synthetic Data. - G. Abhinav, B. Sundar Rajan:
Two-User Gaussian Interference Channel with Finite Constellation Input and FDMA. - (Withdrawn) Routing Protocols for Cognitive Radio Networks: A Survey.
- Ryuhei Mori, Toshiyuki Tanaka, Kenta Kasai, Kohichi Sakaniwa:
Effects of Single-Cycle Structure on Iterative Decoding for Low-Density Parity-Check Codes. - Xi Liu, Elza Erkip:
Alternating-Offer Bargaining Games over the Gaussian Interference Channel. - Anolan Milanés, Noemi de La Rocque Rodriguez, Roberto Ierusalimschy:
Reflection-based language support for the heterogeneous capture and restoration of running computations. - Charles Shen, Henning Schulzrinne:
On TCP-based Session Initiation Protocol (SIP) Server Overload Control. - Srinivasagopalan Srivathsan, Costas Busch, S. Sitharama Iyengar:
Oblivious Buy-at-Bulk in Planar Graphs. - Uriel Feige, Shlomo Jozeph:
Oblivious Algorithms for the Maximum Directed Cut Problem. - Inder Jeet Taneja:
Some Inequalities Among New Divergence Measures. - Yu Su, Margaret H. Dunham:
Visual-hint Boundary to Segment Algorithm for Image Segmentation. - Arthur Szlam, Koray Kavukcuoglu, Yann LeCun:
Convolutional Matching Pursuit and Dictionary Training. - Mohammad Javad Sayadi, Mahmood Fathy:
A New Approach in Packet Scheduling in the Vanet. - Mahdi Cheraghchi:
Derandomization and Group Testing. - (Withdrawn) Nations At War I: Why do we keep building weapons?
- B. Lakshmi, R. Srinivasan:
Statistical Modelling of ft to Process Parameters in 30 nm Gate Length Finfets. - Dimitris S. Papailiopoulos, Alexandros G. Dimakis:
Interference Alignment as a Rank Constrained Rank Minimization. - Dimitris S. Papailiopoulos, Alexandros G. Dimakis:
Distributed Storage Codes Meet Multiple-Access Wiretap Channels. - Suenje Dallmeier-Tiessen, Robert Darby, Bettina Goerner, Jenni Hyppoelae, Peter Igo-Kemenes, Deborah Kahn, Simon C. Lambert, Anja Lengenfelder, Chris Leonard, Salvatore Mele, Panayiota Polydoratou, David Ross, Sergio Ruiz-Perez, Ralf Schimmer, Mark Swaisland, Wim van der Stelt:
First results of the SOAP project. Open access publishing in 2010. - Rahul Jain:
Strong direct product conjecture holds for all relations in public coin randomized one-way communication complexity. - Shriprakash Sinha, Luca Nanetti:
Inaccessibility-Inside Theorem for Point in Polygon. - Bernhard Haeupler:
Analyzing Network Coding Gossip Made Easy. - Somayeh Abdi, Hossein Pedram, Somayeh Mohamadi:
The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical data Grid. - Chenlu Qiu, Namrata Vaswani:
Real-time Robust Principal Components' Pursuit. - George Theodorakopoulos, Jean-Yves Le Boudec, John S. Baras:
Selfish Response to Epidemic Propagation. - Matteo Dell'Amico, Pietro Michiardi, Yves Roudier:
Back To The Future: On Predicting User Uptime. - Petteri Mannersalo, Georgios S. Paschos, Lazaros Gkatzikis:
Performance of wireless network coding: motivating small encoding numbers. - Zheng Wang, Jie Luo:
Error Performance of Channel Coding in Random Access Communication. - Michelle Effros, Tracey Ho, Shirin Jalali:
On Equivalence Between Network Topologies. - Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar:
On Unconditionally Secure Computation with Vanishing Communication Cost. - Masoud Abbaszadeh, Horacio J. Marquez:
Robust H_infinity Filter Design for Lipschitz Nonlinear Systems via Multiobjective Optimization. - Michael W. Mahoney, Lorenzo Orecchia:
Implementing regularization implicitly via approximate eigenvector computation. - Ryutaroh Matsumoto, Masahito Hayashi:
Strong security and separated code constructions for the broadcast channels with confidential messages. - Shang-Guan H. Wu:
A note on hierarchies and bureaucracies. - José Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento:
A Fault Analytic Method against HB+. - Chamberlain Fong, Mike Walters:
Methods for Accelerating Conway's Doomsday Algorithm (part 2). - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
Genetic Algorithm for Mulicriteria Optimization of a Multi-Pickup and Delivery Problem with Time Windows. - Rahul Vaze:
Transmission Capacity of Spectrum Sharing Ad-hoc Networks with Multiple Antennas. - Robert Geisberger:
Engineering Time-dependent One-To-All Computation. - Rahul Jain:
A strong direct product theorem for two-way public coin communication complexity. - Victor Chepoi, Daniela Maftuleac:
Shortest path problem in rectangular complexes of global nonpositive curvature. - Michael Reckhaus, Nico Hochgeschwender, Paul-Gerhard Plöger, Gerhard K. Kraetzschmar:
A Platform-independent Programming Environment for Robot Control. - Dana Jansens, Prosenjit Bose, Paz Carmi, Anil Maheshwari, Pat Morin, Michiel H. M. Smid:
Improved Methods For Generating Quasi-Gray Codes. - Daniele Riboni, Linda Pareschi, Claudio Bettini:
Preserving Privacy in Sequential Data Release against Background Knowledge Attacks. - Namyoon Lee, Wonjae Shin, Bruno Clerckx:
Interference Alignment with Limited Feedback on Two-cell Interfering Two-User MIMO-MAC. - Namyoon Lee, Joohwan Chun:
Signal Space Alignment for an Encryption Message and Successive Network Code Decoding on the MIMO K-way Relay Channel. - Punit Sharma, Partha Sarathi Mandal:
Reconstruction of Aggregation Tree in spite of Faulty Nodes in Wireless Sensor Networks. - Imen Harbaoui Dridi, Ryan Kammarti, Pierre Borne, Mekki Ksouri:
Un Algorithme génétique pour le problème de ramassage et de livraison avec fenêtres de temps à plusieurs véhicules. - Imen Harbaoui Dridi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:
Approche Multicritère pour le Problème de Ramassage et de Livraison avec Fenêtres de Temps à Plusieurs Véhicules. - Keith Wiley, Andrew J. Connolly, Jeffrey P. Gardner, K. Simon Krughoff, Magdalena Balazinska, Bill Howe, YongChul Kwon, Yingyi Bu:
Astronomy in the Cloud: Using MapReduce for Image Coaddition. - Brett Hern, Krishna R. Narayanan:
Multilevel Coding Schemes for Compute-and-Forward. - Ferdinando Cicalese, Ugo Vaccaro:
Superselectors: Efficient Constructions and Applications. - Yaniv Altshuler, Nadav Aharony, Yuval Elovici, Alex Pentland, Manuel Cebrián:
Stealing Reality. - Lei Zhou, Wei Yu:
On the Capacity of the $K$-User Cyclic Gaussian Interference Channel. - Anand Louis:
Cut-Matching Games on Directed Graphs. - Peiliang Xu, M. Elizabeth Cannon, Gérard Lachapelle:
Mixed integer programming for the resolution of GPS carrier phase ambiguities. - Alireza Vahid, Vaneet Aggarwal, Amir Salman Avestimehr, Ashutosh Sabharwal:
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge. - Marc de Falco:
An Explicit Framework for Interaction Nets. - (Withdrawn) Cooperative Distributed Sequential Spectrum Sensing.
- (Withdrawn) A Novel Algorithm for Cooperative Distributed Sequential Spectrum Sensing in Cognitive Radio.
- Alexey Pospelov:
Faster Polynomial Multiplication via Discrete Fourier Transforms. - Leonid Barenboim, Shlomi Dolev, Rafail Ostrovsky:
Deterministic and Energy-Optimal Wireless Synchronization. - Martin Avanzini, Naohi Eguchi, Georg Moser:
A Path Order for Rewrite Systems that Compute Exponential Time Functions (Technical Report). - Ahmet Kara, Thomas Schwentick, Thomas Zeume:
Temporal Logics on Words with Multiple Data Values. - Mikael Fernandus Simalango:
XML Query Processing and Query Languges: A Survey. - G. D. Raghava, B. Sundar Rajan:
Secrecy Capacity of the Gaussian Wire-Tap Channel with Finite Complex Constellation Input. - Arthur Sorkin, Peter Donovan:
LR(1) Parser Generation System: LR(1) Error Recovery, Oracles, and Generic Tokens. - Ioan Ovidiu Hupca, Joel Falcou, Laura Grigori, Radek Stompor:
Spherical harmonic transform with GPUs. - John C. Kieffer, Yu Liao:
Exact Hamming Distortion Analysis of Viterbi Encoded Trellis Coded Quantizers. - Jing Yang, Sennur Ulukus:
Optimal Packet Scheduling in an Energy Harvesting Communication System. - Ali Nazari, Achilleas Anastasopoulos, S. Sandeep Pradhan:
Error Exponent for Multiple-Access Channels:Lower Bounds. - Himanshu Asnani, Haim H. Permuter, Tsachy Weissman:
Probing Capacity. - Brent Heeringa, Marius Catalin Iordan, Louis Theran:
Searching in Dynamic Tree-Like Partial Orders. - Ali Nazari, Ramji Venkataramanan, Dinesh Krithivasan, S. Sandeep Pradhan, Achilleas Anastasopoulos:
Typicality Graphs:Large Deviation Analysis. - Ali Nazari, S. Sandeep Pradhan, Achilleas Anastasopoulos:
A New Upper Bound on the Average Error Exponent for Multiple-Access Channels. - Joost J. Joosten, Fernando Soler-Toscano, Hector Zenil:
Complejidad descriptiva y computacional en máquinas de Turing pequeñas. - Cuizhu Shi, Aditya Ramamoorthy:
Improved Combinatorial Algorithms for Wireless Information Flow. - Masahito Hayashi:
Tight exponential evaluation for information theoretical secrecy based on L1 distance. - Fedor V. Fomin, Daniel Lokshtanov, Neeldhara Misra, Geevarghese Philip, Saket Saurabh:
Hitting forbidden minors: Approximation and Kernelization. - Eric Berberich, Pavel Emeliyanenko, Michael Sagraloff:
An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks. - Karthik Muralidhar, Kwok Hung Li:
On the Full Column-Rank Condition of the Channel Estimation Matrix in Doubly-Selective MIMO-OFDM Systems. - Eric Goles Chacc, Bruno Martin:
Computational Complexity of Avalanches in the Kadanoff two-dimensional Sandpile Model. - Benjamin Doerr, Thomas Jansen, Dirk Sudholt, Carola Winzen, Christine Zarges:
Optimizing Monotone Functions Can Be Difficult. - Walid Saad, Zhu Han, Are Hjørungnes, Dusit Niyato, Ekram Hossain:
Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks. - Fangzhou Wei, Ali E. Yilmaz:
A Hybrid Parallelization of AIM for Multi-Core Clusters: Implementation Details and Benchmark Results on Ranger. - Per Austrin, Subhash Khot:
A Simple Deterministic Reduction for the Gap Minimum Distance of Code Problem. - Vishwakarma Singh, Ambuj K. Singh:
Profile Based Sub-Image Search in Image Databases. - Mohammad Ali Maddah-Ali, David Tse:
Completely Stale Transmitter Channel State Information is Still Very Useful. - Frederic Thouin, Mark Coates, Michael G. Rabbat:
Real-Time Multi-path Tracking of Probabilistic Available Bandwidth. - Zoltán Prekopcsák, Daniel Lemire:
Time Series Classification by Class-Based Mahalanobis Distances. - Mickey Brautbar, Michael J. Kearns:
A Clustering Coefficient Network Formation Game. - Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. - Radha Krishna Ganti, Jeffrey G. Andrews, Martin Haenggi:
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution. - Johannes Faber, Carsten Ihlemann, Swen Jacobs, Viorica Sofronie-Stokkermans:
Automatic Verification of Parametric Specifications with Complex Topologies. - Naqueeb Warsi, Rahul Vaze, Tapan Shah:
Communicating Under Channel Uncertainty. - Michael W. Mahoney:
Algorithmic and Statistical Perspectives on Large-Scale Data Analysis. - Adrià Tauste Campo, Albert Guillen i Fabregas, Ezio Biglieri:
Large-System Analysis of Multiuser Detection with an Unknown Number of Users: A High-SNR Approach. - Vishwambhar Rathi, Rüdiger L. Urbanke, Mattias Andersson, Mikael Skoglund:
Rate-Equivocation Optimal Spatially Coupled LDPC Codes for the BEC Wiretap Channel. - Roberto M. Amadio, Nicholas Ayache, Yann Régis-Gianas, Ronan Saillard:
Certifying cost annotations in compilers. - Mustafa Atay, Yezhou Sun, Dapeng Liu, Shiyong Lu, Farshad Fotouhi:
Mapping XML Data to Relational Data: A DOM-Based Approach. - Cédric Févotte, Jérôme Idier:
Algorithms for nonnegative matrix factorization with the beta-divergence. - (Withdrawn) Improved complexity bounds for real root isolation using Continued Fractions.
- Hesham El Gamal, John Tadrous, Atilla Eryilmaz:
Proactive Resource Allocation: Turning Predictable Behavior into Spectral Gain. - Muhammad Mahbubur Rahman, Afroza Nahar:
Modified Bully Algorithm using Election Commission. - Philipp Schaer, Philipp Mayr, Peter Mutschke:
Implications of Inter-Rater Agreement on a Student Information Retrieval Evaluation. - Thomas Mainguy:
A probabilistic top-down parser for minimalist grammars. - Leo Liberti, Benoît Masson, Jon Lee, Carlile Lavor, Antonio Mucherino:
On the number of solutions of the discretizable molecular distance geometry problem. - Holger Rauhut, Justin K. Romberg, Joel A. Tropp:
Restricted Isometries for Partial Random Circulant Matrices. - Silvio Ghilardi, Silvio Ranise:
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis. - Richard Cole, Vasilis Gkatzelis, Vahab S. Mirrokni:
Coordination Mechanisms for Weighted Sum of Completion Times in Machine Scheduling. - Ilknur Icke, Andrew Rosenberg:
Multi-Objective Genetic Programming Projection Pursuit for Exploratory Data Modeling. - Guo-Qiang Zhang:
Link power coordination for energy conservation in complex communication networks. - Xuan Guang, Fang-Wei Fu:
The Failure Probability at Sink Node of Random Linear Network Coding. - Ash Mohammad Abbas:
Weighted Indices for Evaluating the Quality of Research with Multiple Authorship.