default search action
CoRR, May 2013
- Rozaimi Zakaria, Abd. Fatah Wahab, Rudrusamy U. Gobithaasan:
Perfectly normal type-2 fuzzy interpolation B-spline curve. - Firas A. Jassim:
Image Compression By Embedding Five Modulus Method Into JPEG. - Mario Blaum:
Construction of PMDS and SD Codes extending RAID 5. - Richard Gibson:
Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents. - Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woolf, Alfred O. Hero III:
Revealing social networks of spammers through spectral clustering. - Cunsheng Ding, Tor Helleseth:
Optimal Ternary Cyclic Codes from Monomials. - Martin Fink, Sergey Pupyrev:
Ordering Metro Lines by Block Crossings. - Michal Feldman, David Kempe, Brendan Lucier, Renato Paes Leme:
Pricing Public Goods for Private Sale. - Jiyan Yang, Xiangrui Meng, Michael W. Mahoney:
Quantile Regression for Large-scale Applications. - Pierre Lescanne:
Bubbles are rational. - Marthinus Christoffel du Plessis, Masashi Sugiyama:
Clustering Unclustered Data: Unsupervised Binary Labeling of Two Datasets Having Different Class Balances. - David Eppstein, Michael T. Goodrich, Daniel S. Hirschberg:
Combinatorial Pair Testing: Distinguishing Workers from Slackers. - Valérie Berthé, Clelia de Felice, Francesco Dolce, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone:
Return words in interval exchange transformations. - Mate Boban, João Barros, Ozan K. Tonguz:
Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation. - Valérie Berthé, Clelia de Felice, Francesco Dolce, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone:
Bifix codes and the finite index basis property. - Gloria Lanci:
Translating cities: the use of digital technologies in urban environments. - Lee Naish, Harald Søndergaard:
Truth versus information in logic programming. - Federico D. Sacerdoti:
The Software Garden. - Junting Chen, Vincent K. N. Lau:
Convergence Analysis of Mixed Timescale Cross-Layer Stochastic Optimization. - Markus J. Bauer, Anthony J. Cox, Giovanna Rosone, Marinella Sciortino:
Lightweight LCP Construction for Next-Generation Sequencing Datasets. - Ahmad Biniaz, Anil Maheshwari, Michiel H. M. Smid:
An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem. - Chiu-Wing Sham, Xu Chen, Francis Chung-Ming Lau, Yue Zhao, Wai Man Tam:
A 2.0 Gb/s Throughput Decoder for QC-LDPC Convolutional Codes. - Chantal Cherifi, Yvan Rivierre, Jean François Santucci:
A Community Based Algorithm for Large Scale Web Service Composition. - Chantal Cherifi, Jean François Santucci:
A Comparative Study of Web Services Composition Networks. - Chantal Cherifi, Jean François Santucci:
Analyzing Web Services Networks: a WS-NEXT Application. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Benefits of Semantics on Web Service Composition from a Complex Network Perspective. - Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean François Santucci:
MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation. - Chantal Cherifi:
Similartity Network For Semantic Web Services Substitution. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Topological Properties of Web Services Similarity Networks. - Arik Nemtsov, Amir Averbuch, Alon Schclar:
Matrix Compression using the Nystroöm Method. - Mehryar Mohri, Afshin Rostamizadeh:
Perceptron Mistake Bounds. - Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Aditya Akella, Vyas Sekar:
Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud. - Dina Dushnik, Alon Schclar, Amir Averbuch:
Video Segmentation via Diffusion Bases. - Tamal Das, Marek Drogon, Admela Jukan, Marco Hoffmann:
An Agent-based Modeling Approach of Network Migration to New Technologies. - Theodore Book, Martha Witick, Dan S. Wallach:
Automated generation of web server fingerprints. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
Web Services Dependency Networks Analysis. - David I. Spivak:
The operad of wiring diagrams: formalizing a graphical language for databases, recursion, and plug-and-play circuits. - Andrew Adamatzky, Genaro Juárez Martínez:
Bio-imitaiton of Mexican migration routes to the USA with slime mould on 3D terrains. - Zhenyu Guo, Z. Jane Wang:
An Adaptive Descriptor Design for Object Recognition in the Wild. - Paul Tune, Hung X. Nguyen, Matthew Roughan:
Hidden Markov Model Identifiability via Tensors. - Vladimir V. Gusev, Marina I. Maslennikova, Elena V. Pribavkina:
Finitely generated ideal languages and synchronizing automata. - Mauro Femminella, Gianluca Reali, Walter Colitti, Kris Steenhaut:
A Markovian Model for Assessing the Consistency of Vehicular Storage Systems. - Philipp Mayr:
Relevance distributions across Bradford Zones: Can Bradfordizing improve search? - Mauro Femminella, Gianluca Reali, Dario Valocchi, Roberto Francescangeli, Henning Schulzrinne:
Advanced Caching for Distributing Sensor Data through Programmable Nodes. - Arezoo Aghaei Chadegani, Hadi Salehi, Melor Md. Yunus, Hadi Farhadi, Masood Fooladi, Maryam Farhadi, Nader Ale Ebrahim:
A Comparison between Two Main Academic Literature Collections: Web of Science and Scopus Databases. - Masood Fooladi, Hadi Salehi, Melor Md. Yunus, Maryam Farhadi, Arezoo Aghaei Chadegani, Hadi Farhadi, Nader Ale Ebrahim:
Does Criticisms Overcome the Praises of Journal Impact Factor? - Prasanna Chaporkar, Alexandre Proutière:
Optimal Distributed Scheduling in Wireless Networks under the SINR interference model. - Andrzej Cichocki:
Tensor Decompositions: A New Concept in Brain Data Analysis? - Hugo Reboredo, João M. F. Xavier, Miguel R. D. Rodrigues:
Filter Design with Secrecy Constraints: The MIMO Gaussian Wiretap Channel. - Somayeh Danafar, Paola M. V. Rancoita, Tobias Glasmachers, Kevin Whittingstall, Jürgen Schmidhuber:
Testing Hypotheses by Regularized Maximum Mean Discrepancy. - Mathieu Chapelle, Mathieu Liedloff, Ioan Todinca, Yngve Villanger:
TREEWIDTH and PATHWIDTH parameterized by vertex cover. - Julien Leroy:
An S-adic characterization of minimal subshifts with first difference of complexity 1 ≤ p(n+1) - p(n) ≤ 2. - Emily S. Darling, David Shiffman, Isabelle M. Côté, Joshua A. Drew:
The role of twitter in the life cycle of a scientific publication. - Jie Zhou, Gang Yan, Choy Heng Lai:
Efficient routing on multilayered communication networks. - Yoshua Bengio:
Deep Learning of Representations: Looking Forward. - Akitoshi Kawamura, Stephen A. Cook:
Complexity Theory for Operators in Analysis. - Chantal Cherifi, Jean François Santucci:
On Topological Structure of Web Services Networks for Composition. - Chantal Cherifi, Jean François Santucci:
Community Structure in Interaction Web Service Networks. - A. V. Choudhari, N. A. Pande, M. R. Gupta:
Feasibility Analysis of Low Cost Graphical Processing Units for Electromagnetic Field Simulations by Finite Difference Time Domain Method. - Ruoming Jin, Guan Wang:
Simple, Fast, and Scalable Reachability Oracle. - Jaemin Han, Chih-Chun Wang, Ness B. Shroff:
Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme. - Ruoming Jin, Ning Ruan, Bo You, Haixun Wang:
Hub-Accelerator: Fast and Exact Shortest Path Computation in Large Social Networks. - Zhi Li, Xiaoqing Zhu, Joshua Gahm, Rong Pan, Hao Hu, Ali C. Begen, Dave Oran:
Probe and Adapt: Rate Adaptation for HTTP Video Streaming At Scale. - Chris Whidden, Robert G. Beiko, Norbert Zeh:
Fixed-Parameter and Approximation Algorithms for Maximum Agreement Forests of Multifurcating Trees. - Ruoming Jin, Yelong Shen, Lin Liu, Xue-wen Chen:
Limiting the Neighborhood: De-Small-World Network for Outbreak Prevention. - Petr Jancar:
Finiteness up to bisimilarity is decidable for pushdown processes. - Sushant Sachdeva, Nisheeth K. Vishnoi:
Matrix Inversion Is As Easy As Exponentiation. - Robert Kleinberg, Yang Yuan:
On the Ratio of Revenue to Welfare in Single-Parameter Mechanism Design. - Marco Bernardo, Rocco De Nicola, Michele Loreti:
A Companion of "Relating Strong Behavioral Equivalences for Processes with Nondeterminism and Probabilities". - Shang Shang, Yuk Hui, Pan Hui, Paul W. Cuff, Sanjeev R. Kulkarni:
Privacy Preserving Recommendation System Based on Groups. - Anelia Somekh-Baruch:
On Achievable Rates for Channels with Mismatched Decoding. - Stephen Clark, Bob Coecke, Edward Grefenstette, Stephen Pulman, Mehrnoosh Sadrzadeh:
A quantum teleportation inspired algorithm produces sentence meaning from word meaning and grammatical structure. - (Withdrawn) Extending Modern SAT Solvers for Enumerating All Models.
- Jirí Adámek, Stefan Milius, Lawrence S. Moss, Lurdes Sousa:
Well-Pointed Coalgebras. - Changhong Zhao, Ufuk Topcu, Na Li, Steven H. Low:
Power System Dynamics as Primal-Dual Algorithm for Optimal Load Control. - Taha Hassan, Fahad Javed, Naveed Arshad:
An Empirical Investigation of V-I Trajectory based Load Signatures for Non-Intrusive Load Monitoring. - Shuchi Chawla, Jason D. Hartline, David L. Malec, Balasubramanian Sivan:
Prior-Independent Mechanisms for Scheduling. - Hu Fu, Brendan Lucier, Balasubramanian Sivan, Vasilis Syrgkanis:
Cost-Recovering Bayesian Algorithmic Mechanism Design. - Alireza Mahdian, Richard Han, Qin Lv, Shivakant Mishra:
Results from a Practical Deployment of the MyZone Decentralized P2P Social Network. - Redouane Sassioui, Aata El Hamss, Leszek Szczecinski, Mustapha Benjillali:
Resource Allocation for Downlink Channel Transmission Based on Superposition Coding. - Kamlesh Sharma, T. V. Prasad:
CONATION: English Command Input/Output System for Computers. - Fuqiang Chen:
An Improved EM algorithm. - Deqing Wang, Hui Zhang, Rui Liu, Weifeng Lv:
Feature Selection Based on Term Frequency and T-Test for Text Categorization. - Florian Bruse, Oliver Friedmann, Martin Lange:
Guarded Transformation for the Modal mu-Calculus. - Laurent Bulteau, Christian Komusiewicz:
Minimum Common String Partition Parameterized by Partition Size is Fixed-Parameter Tractable. - Nikola Serafimovski, Abdelhamid Younis, Raed Mesleh, Pat Chambers, Marco Di Renzo, Cheng-Xiang Wang, Peter M. Grant, Mark A. Beach, Harald Haas:
Practical Implementation of Spatial Modulation. - Fuqiang Chen:
Spectral Classification Using Restricted Boltzmann Machine. - Ayad Ghany Ismaeel, Raghad Zuhair Yousif, Essa F. Abdallh:
GUI Based Automatic Remote Control of Gas Reduction System using PIC Microcontroller. - Joan Boyar, Sushmita Gupta, Kim S. Larsen:
Relative Interval Analysis of Paging Algorithms on Access Graphs. - Ayad Ghany Ismaeel, Sanaa Enwaya Rizqo:
Optimal Productivity of Succoring Patients System using Mobile GIS Based on WCF Technology. - Julian Arz, Johannes Fischer:
LZ-Compressed String Dictionaries. - Chantal Cherifi, Vincent Labatut, Jean François Santucci:
On Flexible Web Services Composition Networks. - Eyke Hüllermeier:
Learning from Imprecise and Fuzzy Observations: Data Disambiguation through Generalized Loss Minimization. - Nima Asadi, Jimmy Lin:
Fast, Incremental Inverted Indexing in Main Memory for Web-Scale Collections. - Nina Evseenko:
New hybrid distributed voting algorithm. - Onur Tan, Deniz Gündüz, H. Vincent Poor:
Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices. - Philipp Kindermann, Benjamin Niedermann, Ignaz Rutter, Marcus Schaefer, André Schulz, Alexander Wolff:
Multi-Sided Boundary Labeling. - Michael Hamann, Tanja Hartmann, Dorothea Wagner:
Hierarchies of Predominantly Connected Communities. - Matthew Crossley, Andy Nisbet, Martyn Amos:
Quantifying the Impact of Parameter Tuning on Nature-Inspired Algorithms. - Magnus Bordewich, Catherine S. Greenhill, Viresh Patel:
Mixing of the Glauber dynamics for the ferromagnetic Potts model. - Jonathan D. Hauenstein, Christian Ikenmeyer, J. M. Landsberg:
Computer aided methods for lower bounds on the border rank. - Daniel Dietsch, Andreas Podelski, Jaechang Nam, Pantelis M. Papadopoulos, Martin Schäf:
Monitoring Student Activity in Collaborative Software Development. - Manas Paul, Jyotsna Kumar Mandal:
A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept. - YuLong Zou, Xianbin Wang, Weiming Shen:
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks. - Jinchun Zhan, Namrata Vaswani:
Time Invariant Error Bounds for Modified-CS based Sparse Signal Sequence Recovery. - Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. - Çagdas Çalik:
Nonlinearity Computation for Sparse Boolean Functions. - Sarasvathi V., N. Ch. S. N. Iyengar, Snehanshu Saha:
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks. - Chun Meng, Abhik Kumar Das, Abinesh Ramakrishnan, Syed Ali Jafar, Athina Markopoulou, Sriram Vishwanath:
Precoding-Based Network Alignment For Three Unicast Sessions. - Sameer Pawar, Kannan Ramchandran:
Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples and O(k log k) complexity. - Weifeng Liu, Xiaomeng Wang, Yanjiang Wang:
Dictionary learning based image enhancement for rarity detection. - Riccardo Pucella:
Knowledge and Security. - Hemal Shah, Yogeshwar Kosta, Vikrant Patel:
Characterizing and Evaluation :Temporal properties of real and synthetic datasets for DTN. - Ursula Martin, Alison Pease:
Mathematical practice, crowdsourcing, and social machines. - Ursula Martin, Alison Pease:
What does mathoverflow tell us about the production of mathematics? - Mostafa H. Dahshan:
Maximum-Bandwidth Node-Disjoint Paths. - Luca Barletta, Flaminio Borgonovo, Matteo Cesana:
An Asymptotically Efficient Backlog Estimate for Dynamic Frame Aloha. - Amir M. Ben-Amram:
A Comment on Budach's Mouse-in-an-Octant Problem. - Jalaluddin Qureshi, Chuan Heng Foh, Jianfei Cai:
Primer and Recent Developments on Fountain Codes. - M. A. Khayer Azad, Md. Shafiqul Islam, M. M. A. Hashem:
On Comparison between Evolutionary Programming Network-based Learning and Novel Evolution Strategy Algorithm-based Learning. - Fatima Boumahdi:
Endow a service-oriented architecture by a decisional aspect. - Debajyoti Mukhopadhyay, Manoj Sharma, Gajanan Joshi, Trupti Pagare, Adarsha Palwe:
Intelligent Agent Based Semantic Web in Cloud Computing Environment. - Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra:
Weighted Electoral Control. - Martin Haenggi:
A Versatile Dependent Model for Heterogeneous Cellular Networks. - Iddo Tzameret:
On Sparser Random 3SAT Refutation Algorithms and Feasible Interpolation. - Grenville J. Croll:
BiEntropy - The Approximate Entropy of a Finite Binary String. - Russell Ford, Changkyu Kim, Sundeep Rangan:
Opportunistic Third-Party Backhaul for Cellular Wireless Networks. - William Graham Hoover, Carol Griswold Hoover:
Time-Reversible Random Number Generators : Solution of Our Challenge by Federico Ricci-Tersenghi. - Yuan Zhang:
Optimization Approach to Parametric Tuning of Power System Stabilizer Based on Trajectory Sensitivity Analysis. - Charith Perera, Arkady B. Zaslavsky, Peter Christen, Dimitrios Georgakopoulos:
Context Aware Computing for The Internet of Things: A Survey. - Sun Sun, Min Dong, Ben Liang:
Real-Time Welfare-Maximizing Regulation Allocation in Dynamic Aggregator-EVs System. - Ji Won Yoon, Nial Friel:
Efficient Estimation of the number of neighbours in Probabilistic K Nearest Neighbour Classification. - Geoffroy Ville:
An Optimal Mastermind (4,7) Strategy and More Results in the Expected Case. - Vincent K. N. Lau, Fan Zhang, Ying Cui:
Low Complexity Delay-Constrained Beamforming for Multi-User MIMO Systems with Imperfect CSIT. - (Withdrawn) Simple Deep Random Model Ensemble.
- Ahmed Drissi, Ahmed Asimi:
A New Approch to Decoding of Rational Irreducible Goppa code. - Andrea Mercurio, Alessandro Di Giorgio, Fabio Purificato:
Optimal Fully Electric Vehicle load balancing with an ADMM algorithm in Smartgrids. - Firas Ajil Jassim, Fawzi H. Altaani:
Hybridization of Otsu Method and Median Filter for Color Image Segmentation. - Jaroslav Horácek, Milan Hladík:
Subsquares Approach - Simple Scheme for Solving Overdetermined Interval Linear Systems. - Laura Giordano, Valentina Gliozzi, Nicola Olivetti, Gian Luca Pozzato:
On Rational Closure in Description Logics of Typicality. - Shahriar Etemadi Tajbakhsh, Parastoo Sadeghi:
Random Linear Network Codes for Secrecy over Wireless Broadcast Channels. - Olav Geil, Stefano Martin:
Further improvements on the Feng-Rao bound for dual codes.