


Остановите войну!
for scientists:


default search action
CoRR, January 2011
- Aditya Dua, Nicholas Bambos:
Packet Scheduling in Switches with Target Outflow Profiles. - Katarzyna E. Paluch:
Popular b-matchings. - Emilie Charlier, Narad Rampersad:
The growth function of S-recognizable sets. - Jagbeer Singh:
An Algorithm to Reduce the Time Complexity of Earliest Deadline First Scheduling Algorithm in Real-Time System. - Eric Filiol:
PERSEUS Technology: New Trends in Information and Communication Security. - Naoya Kishiue, Masaya Nakahara, Shirou Maruyama, Hiroshi Sakamoto:
A Searchable Compressed Edit-Sensitive Parsing. - Evgenii Vityaev, Boris Kovalerchuk, Leonid I. Perlovsky, Stanislav Smerdov:
Probabilistic Dynamic Logic of Phenomena and Cognition. - Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, Kenneth Zeger:
Network coding for computing: Linear codes. - Gerald Schubert, Georg Hager, Holger Fehske, Gerhard Wellein:
Parallel sparse matrix-vector multiplication as a test case for hybrid MPI+OpenMP programming. - Markus Wittmann, Georg Hager:
Optimizing ccNUMA locality for task-parallel execution under OpenMP and TBB on multicore-based systems. - Anjan K., Jibi Abraham, Mamatha Jadhav V.:
Design of Transport Layer Based Hybrid Covert Channel Detection Engine. - Sergio España, Arturo González, Oscar Pastor, Marcela Ruiz:
Integration of Communication Analysis and the OO Method: Manual derivation of the Conceptual Model. The SuperStationery Co. lab demo. - Kojiro Higuchi, Arno Pauly:
The degree structure of Weihrauch-reducibility. - Herbert Toth:
Behavioral subtyping through typed assertions. - Jakub Kallas, Manfred Kufleitner, Alexander Lauser:
First-order Fragments with Successor over Infinite Words. - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar:
Enabling Node Repair in Any Erasure Code for Distributed Storage. - Carlos Barron-Romero:
The Complexity of Euclidian 2 Dimension Travelling Salesman Problem versus General Assign Problem, NP is not P. - Sameh Oueslati, Adnane Cherif, Bassel Solaiman:
Maximizing Strength of Digital Watermarks using Fuzzy Logic. - S. K. Jayanthi, S. Sasikala:
Link Spam Detection based on DBSpamClust with Fuzzy C-means Clustering. - A. A. Nippun Kumaar, Kiran G., T. S. B. Sudarshan:
Intelligent Lighting System Using Wireless Sensor Networks. - Li Ping Qian, Ying Jun Zhang, Mung Chiang:
Globally Optimal Distributed Power Control for Nonconcave Utility Maximization. - V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhashini, Narayana D.:
Performance Comparison and Analysis of Preemptive-DSR and TORA. - Ruoyun Gao, Michael S. Lew, Ling Shao:
Dynamic Feature Description in Human Action Recognition. - Thomas Steenbergen, Michael S. Lew:
Analysis of Using Browser-native Technology to Build Rich Internet Applications for Image Manipulation. - Erik R. Gast, Michael S. Lew:
A Framework for Real-Time Face and Facial Feature Tracking using Optical Flow Pre-estimation and Template Tracking. - Jaydip Sen:
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. - Xiaojing Chen, Michael S. Lew:
Binary and nonbinary description of hypointensity in human brain MR images. - Liang Wang, Nies Huijsmans, Michael S. Lew, Dan Tsymbala:
Across Browsers SVG Implementation. - Jaydip Sen:
A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks. - Shubham Chakraborty:
Use of Python and Phoenix-M Interface in Robotics. - Jaydip Sen:
A Robust and Fault-Tolerant Distributed Intrusion Detection System. - Jaydip Sen:
An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks. - Sugreev Kaur, Rajesh Mehra:
High Speed and Area Efficient 2D DWT Processor based Image Compression" Signal & Image Processing. - Eberhard H.-A. Gerbracht:
"On the engineers' new toolbox" or Analog Circuit Design, using Symbolic Analysis, Computer Algebra, and Elementary Network Transformations. - Yu Zhang, Jaeok Park, Mihaela van der Schaar:
Social Norms for Networked Communities. - Mehdi Torbatian, Hossein Najafi, Mohamed Oussama Damen:
Asynchronous Interference Channel: Degrees of Freedom and Interference Alignment. - Edwin Hammerich:
On the heat channel and its capacity. - Lei Zhang, Dongning Guo:
Wireless Peer-to-Peer Mutual Broadcast via Sparse Recovery. - Matthew Brand:
Specular holography. - Rami Atar, Tsachy Weissman:
Mutual Information, Relative Entropy, and Estimation in the Poisson Channel. - Chinmay S. Vaze, Mahesh K. Varanasi:
The Degrees of Freedom Region of the Two-User MIMO Broadcast Channel with Delayed CSI. - Edward Grefenstette, Mehrnoosh Sadrzadeh, Stephen Clark, Bob Coecke, Stephen Pulman:
Concrete Sentence Spaces for Compositional Distributional Models of Meaning. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:
On the Performance of Selection Cooperation with Imperfect Channel Estimation. - Walid Abediseid, Mohamed Oussama Damen:
Lattice Sequential Decoder for Coded MIMO Channel: Performance and Complexity Analysis. - Tobias Kretz:
A Round-Robin Tournament of the Iterated Prisoner's Dilemma with Complete Memory-Size-Three Strategies. - Yuya Dan:
Diffusion of Confidential Information on Networks. - Andrew Pavlo, Ning Shi:
Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. - Randall J. Sobie, Ashok Agarwal, M. Anderson, Patrick Armstrong, K. Fransham, Ian Gable, D. Harris, C. Leavett-Brown, Michael Paterson, D. Penfold-Brown, M. Vliet, Andre Charbonneau, Roger Impey, Wayne Podaima:
Data Intensive High Energy Physics Analysis in a Distributed Cloud. - Ashish Ranjan Hota, Ankit Pat:
An Adaptive Quantum-inspired Differential Evolution Algorithm for 0-1 Knapsack Problem. - Benyuan Liu, Olivier Dousse, Philippe Nain, Donald F. Towsley:
Dynamic Coverage of Mobile Sensor Networks. - Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Chekima, Sigeru Omatu:
Combining Neural Networks for Skin Detection. - M. Emre Celebi:
Improving the Performance of K-Means for Color Quantization. - Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee:
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. - Michael Fairbank, Eduardo Alonso:
The Local Optimality of Reinforcement Learning by Value Gradients, and its Relationship to Policy Gradient Learning. - Ayatullah Faruk Mollah, Subhadip Basu, Mita Nasipuri:
Segmentation of Camera Captured Business Card Images for Mobile Devices. - Junting Chen, Vincent K. N. Lau, Yong Cheng:
Distributive Network Utility Maximization (NUM) over Time-Varying Fading Channels. - Lars Kai Hansen, Adam Arvidsson, Finn Årup Nielsen, Elanor Colleoni, Michael Etter:
Good Friends, Bad News - Affect and Virality in Twitter. - Hartmut Klauck:
On Arthur Merlin Games in Communication Complexity. - Mehrdad Valipour, Farshad Lahouti:
Channel Optimized Distributed Multiple Description Coding. - Maurice Margenstern:
Coordinates for a new triangular tiling of the hyperbolic plane. - Fabian van den Broek:
Eavesdropping on GSM: state-of-affairs. - Tianji Li, Douglas J. Leith, David Malone:
Buffer Sizing for 802.11 Based Networks. - Jean Cardinal, Matias Korman:
Coloring Planar Homothets and Three-Dimensional Hypergraphs. - Derek Groen, Simon Portegies Zwart, Tomoaki Ishiyama, Junichiro Makino:
High Performance Gravitational N-body Simulations on a Planet-wide Distributed Supercomputer. - Paul Logasa Bogen II, Frank M. Shipman III, Richard Furuta:
Distributed Collections of Web Pages in the Wild. - Chandra Nair:
A note on outer bounds for broadcast channel. - Mehdi Seyfi, Sami Muhaidat, Jie Liang:
On the Performance of Selection Cooperation with Outdated CSI and Channel Estimation Errors. - Avaré Stewart, Ricardo Lage, Ernesto Diaz-Aviles, Peter Dolog:
Personalized Event-Based Surveillance and Alerting Support for the Assessment of Risk. - Miao Song:
The Role of Computer Graphics in Documentary Film Production. - G. A. Tarnavsky, Evgenii V. Vorozhtsov:
Computer Simulation Center in Internet. - Gerhard de Koning Gans, Eric R. Verheul:
Best Effort and Practice Activation Codes. - Noam Presman, Ofer Shapira, Simon Litsyn:
Binary Polar Code Kernels from Code Decompositions. - Venkata Ravinder Paruchuri:
Information Retrieval of Jumbled Words. - Raphaël Clifford, Markus Jalsenius:
Lower Bounds for Online Integer Multiplication and Convolution in the Cell-Probe Model. - Benjamin Doerr, Daniel Johannsen, Carola Winzen:
Multiplicative Drift Analysis. - Thomas Schoenemann, Simon Masnou, Daniel Cremers:
On a linear programming approach to the discrete Willmore boundary value problem and generalizations. - Sergey Tarasenko:
Emotionally Colorful Reflexive Games. - Joseph O'Rourke:
Convex Polyhedra Realizing Given Face Areas. - Péricles Lopes Machado:
O Algoritmo usado no programa de criptografia PASME. - Bing Hui, Manar Mohaisen, KyungHi Chang:
Improved Achievable Rates for Regularized Tomlinson-Harashima Precoding in Multiuser MIMO Downlink. - Hongsun An, Manar Mohaisen, KyungHi Chang:
Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen's Algorithm. - Paul N. Balister, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky:
Energy-Latency Tradeoff for In-Network Function Computation in Random Networks. - Jun Luo, Ying He:
GeoQuorum: Load Balancing and Energy Efficient Data Access in Wireless Sensor Networks. - Jamshid Abouei, J. David Brown, Konstantinos N. Plataniotis, Subbarayan Pasupathy:
Energy Efficiency and Reliability in Wireless Biomedical Implant Systems. - Yota Otachi, Ryohei Suda:
Bandwidth and pathwidth of three-dimensional grids. - Cody Roux:
Refinement Types as Higher Order Dependency Pairs. - Tobias Koch, Amos Lapidoth:
Does Output Quantization Really Cause a Loss of 2dB? - Haris Aziz, Bart de Keijzer:
Complexity of coalition structure generation. - Benjamin Morandi, Sebastian Nanz, Bertrand Meyer:
A comprehensive operational semantics of the SCOOP programming model. - Ishay Haviv, Michael Langberg:
Beating the Gilbert-Varshamov Bound for Online Channels. - Joel A. Tropp:
From joint convexity of quantum relative entropy to a concavity theorem of Lieb. - Alexander Rand:
On the Non-Termination of Ruppert's Algorithm. - Serguei A. Mokhov, Marc-André Laverdière, Nader Hatami, Ali Benssam:
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers. - Yael Amsterdamer, Daniel Deutch, Val Tannen:
Provenance for Aggregate Queries. - Giuliano Andrea Pagani, Marco Aiello:
Towards Decentralized Trading: A Topological Investigation of the Dutch Medium and Low Voltage Grids. - Steve Chien, Prahladh Harsha, Alistair Sinclair, Srikanth Srinivasan:
Almost Settling the Hardness of Noncommutative Determinant. - Rishin Haldar, Debajyoti Mukhopadhyay:
Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach. - Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard:
Statistical Analysis of Link Scheduling on Long Paths. - Mian Dong, Lin Zhong:
Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays. - Ranjeet Devarakonda, Giriprakash Palanisamy:
Scientific data searching, sharing and retrieval. - Johanne Cohen, Christoph Dürr, Kim Thang Nguyen:
Non-clairvoyant Scheduling Games. - Brijnesh J. Jain, Klaus Obermayer:
Extending Bron Kerbosch for Solving the Maximum Weight Clique Problem. - Hermann Gruber:
Bounding the Feedback Vertex Number of Digraphs in Terms of Vertex Degrees. - Mojtaba Rahmati, Tolga M. Duman:
Analytical Lower Bounds on the Capacity of Insertion and Deletion Channels. - Weiliang Zeng, Chengshan Xiao, Mingxi Wang, Jianhua Lu:
Linear Precoding for Relay Networks with Finite-Alphabet Constraints. - Dae-Sung Jang, Sun-Il Kwon:
Fast Approximation Algorithms for Art Gallery Problems in Simple Polygons. - Walid Abediseid, Mohamed Oussama Damen:
Time-Out Lattice Sequential Decoding for the MIMO ARQ Channel. - Xiaoxiao Yang:
A Probabilistic Variant of Projection Temporal Logic. - Stephen A. Cook, Lila Fontes:
Formal Theories for Linear Algebra. - Sudipta Das, Lawrence Jenkins, Debasis Sengupta:
Comparison of Loss ratios of different scheduling algorithms. - Lorne Applebaum, Waheed U. Bajwa, Marco F. Duarte, A. Robert Calderbank:
Asynchronous Code-Division Random Access Using Convex Optimization. - Kyle W. Burke, Olivia George:
A PSPACE-complete Graph Nim. - Chuan Huang, Jinhua Jiang, Shuguang Cui:
On the Achievable Rates of the Diamond Relay Channel with Conferencing Links. - Michaël Cadilhac, Alain Finkel, Pierre McKenzie:
Storming the Parikh Automaton. - Charles Dossal, Marie-Line Chabanol, Gabriel Peyré, Jalal Fadili:
Sharp Support Recovery from Noisy Random Measurements by L1 minimization. - Nor Amizam Jusoh, Jasni Mohamad Zain:
Application of Freeman Chain Codes: An Alternative Recognition Technique for Malaysian Car Plates. - Jasni Mohamad Zain, Malcolm Clarke:
Reversible Region of Non-Interest (RONI) Watermarking for Authentication of DICOM Images. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:
Probing a Self-Developed Aesthetics Measurement Application (SDA) in Measuring Aesthetics of Mandarin Learning Web Page Interfaces. - Jasni Mohamad Zain, Mengkar Tey, Yingsoon Goh:
Does Aesthetics of Web Page Interface Matters to Mandarin Learning? - Dominic Meier, Yvonne-Anne Pignolet, Stefan Schmid, Roger Wattenhofer:
On the Windfall and Price of Friendship: Inoculation Strategies on Social Networks. - Philipp Mayr, Philipp Schaer, Peter Mutschke:
A Science Model Driven Retrieval Prototype. - Philipp Mayr, Peter Mutschke, Vivien Petras, Philipp Schaer, York Sure:
Applying Science Models for Search. - Natalie Schluter:
Restarting Automata with Auxiliary Symbols and Small Lookahead. - Shunqing Zhang, Vincent K. N. Lau:
Multi-Relay Selection Design and Analysis for Multi-Stream Cooperative Communications. - Emilie Charlier, Michael Domaratzki, Tero Harju, Jeffrey O. Shallit:
Finite Orbits of Language Operations. - Ted Herman:
Safe Register Token Transfer in a Ring. - Ladan Baghai-Ravary, Sergio Grau, Greg Kochanski:
Detecting gross alignment errors in the Spoken British National Corpus. - Mustafa El-Halabi, Tie Liu, Costas N. Georghiades:
Secret Writing on Dirty Paper: A Deterministic View. - Aditya Bhaskara, Moses Charikar, Rajsekar Manokaran, Aravindan Vijayaraghavan:
On Quadratic Programming with a Ratio Objective. - Rahul Urgaonkar, Michael J. Neely:
Network Capacity Region and Minimum Energy Function for a Delay-Tolerant Mobile Ad Hoc Network. - Jagbeer Singh:
Precise Schedulability Analysis for unfeasible to notify separately for comprehensive - EDF Scheduling of interrupted Hard Real-Time Tasks on the similar Multiprocessors. - Krishnendu Chatterjee, Nathanaël Fijalkow:
Finitary languages. - Julien Cristau:
Automata and temporal logic over arbitrary linear time. - José Joaquín Bernal, Juan Jacobo Simón:
Information sets from defining sets in abelian codes. - Suvansh Lal:
A Logic Programming Approach for Formal Verification of NetBill Security and Transactions Protocol. - Suvansh Lal, Mohit Jain, Vikrant Chaplot:
Approaches to Formal Verification of Security Protocols. - Hrishikesh Karmarkar, Supratik Chakraborty:
Determinization of $\omega$-automata unified. - Sami Hissoiny, Philippe Després, Benoît Ozell:
Using graphics processing units to generate random numbers. - Patrick Solé, Jean-Claude Belfiore:
Constructive spherical codes near the Shannon bound. - Michael T. Goodrich, Nodari Sitchinava, Qin Zhang:
Sorting, Searching, and Simulation in the MapReduce Framework. - Stefano Galli:
A Novel Approach to the Statistical Modeling of Wireline Channels. - Mojtaba Vaezi, Mai Vu:
Superposition Coding-Based Bounds and Capacity for the Cognitive Z-Interference Channels. - Washington Taylor, Jud Leonard, Lawrence C. Stewart:
Efficient tilings of de Bruijn and Kautz graphs. - Siva K. Gorantla, Baris Nakiboglu, Todd P. Coleman, Lizhong Zheng:
Multi-layer Bit-wise Unequal Error Protection for Variable Length Blockcodes with Feedback. - Howard J. Karloff, Flip Korn, Konstantin Makarychev, Yuval Rabani:
On Parsimonious Explanations for 2-D Tree- and Linearly-Ordered Data.