default search action
CoRR, February 2012
- Sangwoo Park, Erchin Serpedin, Khalid A. Qaraqe:
On the equivalence between Stein and de Bruijn identities. - Houari Mahfoud, Abdessamad Imine:
A General Approach for Securely Querying and Updating XML Data. - Aitzaz Ahmad, Davide Zennaro, Erchin Serpedin, Lorenzo Vangelista:
Time-varying Clock Offset Estimation in Two-way Timing Message Exchange in Wireless Sensor Networks Using Factor Graphs. - Tad Hogg, Kristina Lerman:
Social Dynamics of Digg. - Harold S. Connamacher, Michael Molloy:
The Satisfiability Threshold for a Seemingly Intractable Random Constraint Satisfaction Problem. - Aboulnasr Hassanien, Sergiy A. Vorobyov, Alex B. Gershman:
Moving Target Parameters Estimation in Non-Coherent MIMO Radar Systems. - Jianhang Gao, Qing Zhao, Wei Ren, Ananthram Swami, Ram Ramanathan, Amotz Bar-Noy:
Dynamic Shortest Path Algorithms for Hypergraphs. - Yanlin Geng, Chandra Nair:
The capacity region of the two-receiver vector Gaussian broadcast channel with private and common messages. - Christine Fricker, Philippe Robert, James Roberts, Nada Sbihi:
Impact of traffic mix on caching performance in a content-centric network. - Yuriy Ostapov:
Inference and Plausible Reasoning in a Natural Language Understanding System Based on Object-Oriented Semantics. - Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity. - Rohit Aggarwal, Can Emre Koksal, Philip Schniter:
On the Design of Large Scale Wireless Systems. - Themistoklis Charalambous, Charalambos D. Charalambous, Sergey Loyka:
Lossless Source Codes for a Class Described by Variational Distance and Optimal Merging Algorithm. - Yair Noam, Andrea Goldsmith:
Spatial MAC in MIMO Communications and its Application to Underlay Cognitive Radio. - Wei Yang, Giuseppe Durisi, Erwin Riegler:
On the Capacity of Large-MIMO Block-Fading Channels. - Jean-Charles Faugère, Mohab Safey El Din, Pierre-Jean Spaenlehauer:
Critical Points and Gröbner Bases: the Unmixed Case. - Oscar Gonzalez, Carlos Beltrán, Ignacio Santamaría:
On the Feasibility of Interference Alignment for the K-User MIMO Channel with Constant Coefficients. - Sindhu Chitikela, Subhash C. Kak:
Increasing Randomness Using Permutations on Blocks. - Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter. - Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri:
Non-adaptive Group Testing: Explicit bounds and novel algorithms. - Ömer Bulakci:
Multi-hop Moving Relays for IMT-Advanced and Beyond. - Ömer Bulakci:
On Backhauling of Relay Enhanced Networks in LTE-Advanced. - Fernand Meyer:
The watershed concept and its use in segmentation : a brief history. - V. Spoorthy Ella:
Randomization Using Quasigroups, Hadamard and Number Theoretic Transforms. - Fabian Lim, Manabu Hagiwara:
Linear Programming Upper Bounds on Permutation Code Sizes From Coherent Configurations Related to the Kendall Tau Distance Metric. - Daniel Zinn:
Weak Forms of Monotonicity and Coordination-Freeness. - Sertac Karaman, Emilio Frazzoli:
High-speed Flight in an Ergodic Forest. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:
Error Performance of Multidimensional Lattice Constellations-Part I: A Parallelotope Geometry Based Approach for the AWGN Channel. - Koralia N. Pappi, Nestor D. Chatzidiamantis, Theodore N. Chronis, George K. Karagiannidis:
Error Performance of Multidimensional Lattice Constellations-Part II: Evaluation over Fading Channels. - Barnabás Póczos, Liang Xiong, Danica J. Sutherland, Jeff G. Schneider:
Support Distribution Machines. - Ronen Dar, Meir Feder, Mark Shtaif:
The Jacobi MIMO Channel. - Petar Popovski, Zoran Utkovski:
Protocol Coding through Reordering of User Resources, Part I: Capacity Results. - Petar Popovski, Zoran Utkovski, Kasper F. Trillingsgaard:
Protocol Coding through Reordering of User Resources, Part II: Practical Coding Strategies. - Leslie Ann Goldberg, Mark Jerrum:
The Complexity of Computing the Sign of the Tutte Polynomial (and consequent #P-hardness of Approximation). - Sergio Cabello, Erin W. Chambers, Jeff Erickson:
Multiple-Source Shortest Paths in Embedded Graphs. - Giorgio Ausiello, Donatella Firmani, Luigi Laura:
Real-Time Monitoring of Undirected Networks: Articulation Points, Bridges, and Connected and Biconnected Components. - Louis Lei Yu, Sitaram Asur, Bernardo A. Huberman:
Artificial Inflation: The True Story of Trends in Sina Weibo. - Emilio Ferrara, Giacomo Fiumara:
Topological Features of Online Social Networks. - Roja Bandari, Sitaram Asur, Bernardo A. Huberman:
The Pulse of News in Social Media: Forecasting Popularity. - Hessam Mahdavifar, Alexander Vardy:
Algebraic List-decoding of Subspace Codes. - Anoosheh Heidarzadeh, Amir H. Banihashemi:
How Fast Can Dense Codes Achieve the Min-Cut Capacity of Line Networks? - Alexander M. Romanov:
On the admissible families of components of Hamming codes. - Yixuan Xie, Jun Li, Robert A. Malaney, Jinhong Yuan:
Channel Identification and its Impact on Quantum LDPC Code Performance. - Vijay Ganesh, Michael Carbin, Martin C. Rinard:
Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography. - Ton Kloks:
A note on probe cographs. - Yair Noam, Andrea Goldsmith:
Blind Null-Space Learning for MIMO Underlay Cognitive Radio Networks. - Samar Agnihotri, Sidharth Jaggi, Minghua Chen:
Analog Network Coding in General SNR Regime. - Ihab Sbeity, Leonardo Brenner, Mohamed Dbouk:
Generating a Performance Stochastic Model from UML Specifications. - Yuval Lomnitz, Meir Feder:
Universal communication over unknown vector channels. - Josep Díaz, Leslie Ann Goldberg, George B. Mertzios, David Richerby, Maria J. Serna, Paul G. Spirakis:
Can Fixation be Guaranteed in the Generalized Moran Process? - Matej Hoffmann, Rolf Pfeifer:
The implications of embodiment for behavior and cognition: animal and robotic case studies. - Yang Zhu, Mai Vu:
Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar:
Game Theoretic Methods for the Smart Grid. - Hernan Haimovich, María M. Seron:
Bounds and Invariant Sets for a Class of Switching Systems with Delayed-state-dependent Perturbations. - Nicolas Le Scouarnec:
Exact Scalar Minimum Storage Coordinated Regenerating Codes. - Walid Saad, Zhu Han, H. Vincent Poor, Tamer Basar, Ju Bin Song:
A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Network. - Walid Saad, Zhu Han, Tamer Basar, Mérouane Debbah, Are Hjørungnes:
Network Formation Games Among Relay Stations in Next Generation Wireless Networks. - Walid Saad, Zhu Han, Rong Zheng, Are Hjørungnes, Tamer Basar, H. Vincent Poor:
Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks. - Philip Kelly, M. H. van Emden:
Relational Semantics for Databases and Predicate Calculus. - Kehao Wang, Lin Chen, Quan Liu, Khaldoun Al Agha:
On Optimality of Myopic Sensing Policy with Imperfect Sensing in Multi-channel Opportunistic Access. - Peter Abeles:
Resolving Implementation Ambiguity and Improving SURF. - Saikat Guha, Mark M. Wilde:
Polar coding to achieve the Holevo capacity of a pure-loss optical channel. - G. David Forney Jr., Heide Gluesing-Luerssen:
Observability, Controllability and Local Reducibility of Linear Codes on Graphs. - Venkatesan Guruswami, Srivatsan Narayanan, Carol Wang:
List decoding subspace codes from insertions and deletions. - Ersen Ekrem, Sennur Ulukus:
An Outer Bound for the Vector Gaussian CEO Problem. - Gautam S. Thakur, Mohsen Ali, Pan Hui, Ahmed Helmy:
Comparing Background Subtraction Algorithms and Method of Car Counting. - Steven A. Kieffer:
ProofFlow: Flow Diagrams for Proofs. - Tad Hogg, Robert A. Freitas Jr.:
Acoustic Communication for Medical Nanorobots. - (Withdrawn) A Constructive Proof of the Cycle Double Cover Conjecture.
- Ghazale Hosseinabadi, Nitin H. Vaidya:
Token-DCF: An Opportunistic MAC protocol for Wireless Networks. - Randa Zakhour, Stephen V. Hanly:
Min-max fair coordinated beamforming in cellular systems via large systems analysis. - Xiao Ma, Jia Liu, Baoming Bai:
On Parameterized Gallager's First Bounds for Binary Linear Codes over AWGN Channels. - Dorian Goldfeld, Paul E. Gunnells:
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser. - Chuan Huang, Shuguang Cui:
On the Alternative Relaying Diamond Channel with Conferencing Links. - Roberto Henry Herrera, Rubén Orozco, Manuel Rodríguez:
Wavelet-based deconvolution of ultrasonic signals in nondestructive evaluation. - Ravi Rastogi, Nitin, Durg Singh Chauhan, Mahesh Chandra Govil:
Disjoint Paths Multi-stage Interconnection Networks Stability Problem. - Shaily Mittal, Nitin:
A Resolution for Shared Memory Conflict in Multiprocessor System-on-a-Chip. - Ravi Rastogi, Amit Singh, Nikhil Singhal, Nitin, Durg Singh Chauhan:
Case Tool: Fast Interconnections with New 3-Disjoint Paths MIN Simulation Module. - Nitin, Ankush Bansal, Siddhartha Mahadev Sharma, Kapil Kumar, Anuj Aggarwal, Sheenu Goyal, Kanika Choudhary, Kunal Chawla, Kunal Jain, Manav Bhasin:
Classification of Flames in Computer Mediated Communications. - Xiao Ma, Jia Liu, Qiutao Zhuang:
New Geometrical Spectra of Linear Codes with Applications to Performance Analysis. - Hamish Cunningham:
Agile Research. - Ryuhei Mori, Toshiyuki Tanaka:
Central Approximation in Statistical Physics and Information Theory. - Urban Larsson, Johan Wästlund:
From heaps of matches to the limits of computability. - Matteo De Felice, Sandro Meloni, Stefano Panzieri:
Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics. - F. Mehmet Ozcelik, Goksel Uctu, Elif Uysal-Biyikoglu:
Optimal Packet Scheduling on an Energy Harvesting Fading Channel. - Ivan Gazeau, Dale Miller, Catuscia Palamidessi:
A non-local method for robustness analysis of floating point programs. 63-76 - Glenn C. Rhoads, Laurent Bartholdi:
The Game of Pure Strategy is solved! - Qin Huang, Keke Liu, Zulin Wang:
Low-Density Arrays of Circulant Matrices: Rank and Row-Redundancy Analysis, and Quasi-Cyclic LDPC Codes. - Carlos Granell, Laura Díaz, Alain Tamayo, Joaquín Huerta:
Assessment of OGC Web Processing Services for REST principles. - Easton Li Xu, Weiping Shang, Guangyue Han:
A Graph Theoretical Approach to Network Encoding Complexity. - Lu Wei, Olav Tirkkonen, K. D. Prathapasinghe Dharmawansa, Matthew R. McKay:
On the Exact Distribution of the Scaled Largest Eigenvalue. - Weifei Zeng, Chris T. K. Ng, Muriel Médard:
Joint Coding and Scheduling Optimization in Wireless Systems with Varying Delay Sensitivities. - Jan Obdrzálek, Jiri Slaby, Marek Trtík:
STANSE: Bug-finding Framework for C Programs. - (Withdrawn) Protection from Unresponsive Flows with Geometric CHOKe.
- Tomás Brázdil, Krishnendu Chatterjee, Antonín Kucera, Petr Novotný:
Efficient Controller Synthesis for Consumption Games with Multiple Resource Types. - Xudong Ma:
On Coding Efficiency for Flash Memories. - Natalia Silberstein, Ankit Singh Rawat, Sriram Vishwanath:
Adversarial Error Resilience in Distributed Storage Using MRD Codes and MDS Array Codes. - Fatemeh Hamidi-Sepehr, Jean-François Chamberland, Henry D. Pfister:
On The Performance of Random Block Codes over Finite-State Fading Channels. - Mohit Thakur, Nadia Fawaz, Muriel Médard:
Reducibility of joint relay positioning and flow optimization problem. - Javier Insa-Cabrera, Jose-Luis Benacloch-Ayuso, José Hernández-Orallo:
On the influence of intelligence in (social) intelligence testing environments. - Ramji Venkataramanan, Antony Joseph, Sekhar Tatikonda:
Gaussian Rate-Distortion via Sparse Regression over Compact Dictionaries. - Josef Cibulka, Jan Kyncl, Viola Mészáros, Rudolf Stolar, Pavel Valtr:
Graph sharing games: complexity and connectivity. - Song-Nam Hong, Giuseppe Caire:
Reverse Compute and Forward: A Low-Complexity Architecture for Downlink Distributed Antenna Systems. - Buyue Qian, Xiang Wang, Ian Davidson:
A Reconstruction Error Formulation for Semi-Supervised Multi-task and Multi-view Learning. - Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:
Imperfect Secrecy in Wiretap Channel II. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Asymptotically Good Codes Over Non-Abelian Groups. - Aria Ghasemian Sahebi, S. Sandeep Pradhan:
Nested Lattice Codes for Arbitrary Continuous Sources and Channels. - Nan Ma, Kannan Ramchandran, David Tse:
A Compression Algorithm Using Mis-aligned Side-information. - Hessam Mahdavifar, Alexander Vardy:
List-decoding of Subspace Codes and Rank-Metric Codes up to Singleton Bound. - Guillermo D. Cañas:
Practical Conditions for Well-behaved-ness of Anisotropic Voronoi Diagrams. - Yuxin Chen, Yonina C. Eldar, Andrea J. Goldsmith:
Channel Capacity under General Nonuniform Sampling. - Tadashi Wadayama, Yuki Fujii:
A Coding Theoretic Approach for Evaluating Accumulate Distribution on Minimum Cut Capacity of Weighted Random Graphs. - Ranjan Pal:
Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem. - Ranjan Pal, Pan Hui:
The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know. - Photios A. Stavrou, Charalambos D. Charalambous, Christos K. Kourtellaris:
Causal Rate Distortion Function on Abstract Alphabets: Optimal Reconstruction and Properties. - Amin Aminzadeh Gohari, Chandra Nair, Venkat Anantharam:
On Marton's inner bound for broadcast channels. - Murdoch Gabbay, Aleksandar Nanevski:
Denotation of syntax and metaprogramming in contextual modal type theory (CMTT). - Daniel Gonçalves, Benjamin Lévêque:
Toroidal maps : Schnyder woods, orthogonal surfaces and straight-line representations. - Sebastian Rudolph, Markus Krötzsch, Pascal Hitzler:
Type-elimination-based reasoning for the description logic SHIQbs using decision diagrams and disjunctive datalog. - Wenbing Dang, Ali Pezeshki, Stephen D. Howard, William Moran, A. Robert Calderbank:
Coordinating Complementary Waveforms for Sidelobe Suppression. - Jérémie Du Boisberranger, Danièle Gardy, Yann Ponty:
The weighted words collector. - Ittai Abraham, Shiri Chechik, David Kempe, Aleksandrs Slivkins:
Low-distortion Inference of Latent Similarities from a Multiplex Social Network. - Farzad Farnoud, Narayana P. Santhanam, Olgica Milenkovic:
Alternating Markov Chains for Distribution Estimation in the Presence of Errors. - Farzad Farnoud, Vitaly Skachek, Olgica Milenkovic:
Rank Modulation for Translocation Error Correction. - Chiranjib Choudhuri, Urbashi Mitra:
Action Dependent Strictly Causal State Communication. - Abhishek Ghosh, Sudhakar Pamarti:
Dithered quantizers with negligible in-band dither power. - Mark A. Davenport, Ery Arias-Castro:
Compressive binary search. - Alex Pappachen James, Akshay Kumar Maan:
Improving feature selection algorithms using normalised feature histograms. - Charalambos D. Charalambous, Photios A. Stavrou:
Directed Information on Abstract spaces: Properties and Extremum Problems. - Stefano Rini:
A New Random Coding Technique that Generalizes Superposition Coding and Binning. - Stefano Rini:
On the Capacity of a General Multiple-Access Channel and of a Cognitive Network in the Very Strong Interference Regime. - Elchanan Mossel, Omer Tamuz:
Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit. - Josef Spillner, Alexander Schill:
π-Control: A Personal Cloud Control Centre. - Stefano Rini, Carolin Huppert:
The Capacity of the Semi-Deterministic Cognitive Interference Channel with a Common Cognitive Message and Approximate Capacity for the Gaussian Case. - Kenta Kasai, Takayuki Nozaki, Kohichi Sakaniwa:
Spatially-Coupled Binary MacKay-Neal Codes for Channels with Non-Binary Inputs and Affine Subspace Outputs. - Birte Glimm, Aidan Hogan, Markus Krötzsch, Axel Polleres:
OWL: Yet to arrive on the Web of Data? - Massimo Di Pierro:
Improving non-linear fits. - Sunghyu Han, Jon-Lark Kim:
Computational Results of Duadic Double Circulant Codes. - Ton Kloks:
Packing interval graphs with vertex-disjoint triangles. - K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran, P. Vijay Kumar:
Regenerating Codes for Errors and Erasures in Distributed Storage. - Alex Rudnick:
Considering a resource-light approach to learning verb valencies. - Mike McKerns, Houman Owhadi, Clint Scovel, Timothy John Sullivan, Michael Ortiz:
The Optimal Uncertainty Algorithm in the Mystic Framework.