


default search action
CoRR, May 2014
- Moritz Kassner, William Patera, Andreas Bulling:

Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction. - Namyoon Lee, Robert W. Heath Jr.:

Space-Time Physical-Layer Network Coding. - Namyoon Lee, Ravi Tandon, Robert W. Heath Jr.:

Distributed Space-Time Interference Alignment. - Matthijs Vákár:

Syntax and Semantics of Linear Dependent Types. - Aaron Hunter:

Belief Revision and Trust. - T. El-Shishtawy:

A Mobile Management System for Reforming Subsidies Distribution in Developing Countries. - Zubair Nabi, Atif Alvi:

Clome: The Practical Implications of a Cloud-based Smart Home. - Paul F. Tupper:

Exemplar Dynamics Models of the Stability of Phonological Categories. - Giuseppe De Giacomo, Riccardo De Masellis, Marco Grasso, Fabrizio Maria Maggi, Marco Montali:

LTLf and LDLf Monitoring: A Technical Report. - Arseny M. Shur, Abuzer Yakaryilmaz:

Quantum, Stochastic, and Pseudo Stochastic Languages with Few States. - Haoyu Song, Jun Gong, Hongfei Chen, Justin Dustzadeh:

Unified POF Programming for Diversified SDN Data Plane. - Bertrand Wechsler, Dan Eilat, Nicolas Limal:

Information Flow Decomposition in Feedback Systems: Linear Time-Invariant Systems with Gaussian Channels. - Mahmoud Khademi, Louis-Philippe Morency:

Relative Facial Action Unit Detection. - Hoda Daou, Fabrice Labeau:

Medically Relevant Criteria used in EEG Compression for Improved Post-Compression Seizure Detection. - Hovhannes Tananyan:

Domination games played on line graphs of complete multipartite graphs. - C. Venkatesh, D. Nagaraju, T. Sunil Kumar Reddy:

Binary Protector: Intrusion Detection in Multitier Web Applications. - Antonios Michaloliakos, Ryan Rogalin, Yonglong Zhang, Konstantinos Psounis, Giuseppe Caire:

Performance Modeling of Next-Generation Wireless Networks. - Rajesh Hemant Chitnis, Graham Cormode, Mohammad Taghi Hajiaghayi, Morteza Monemizadeh:

Parameterized Streaming Algorithms for Vertex Cover. - Ms. Rajni, Ms. Reena:

Review of MANETS Using Distributed Public-key Cryptography. - Manju Kaushik, Rashmi Jain:

Natural User Interfaces: Trend in Virtual Interaction. - Christian A. Naesseth, Fredrik Lindsten, Thomas B. Schön:

Capacity estimation of two-dimensional channels using Sequential Monte Carlo. - Noémi Gaskó, Rodica Ioana Lung, D. Dumitrescu:

Computing Strong Nash Equilibria for Multiplayer Games. - Vaibhav Jha, Mohit Jha, G. K. Sharma:

Estimation of Optimized Energy and Latency Constraints for Task Allocation in 3d Network on Chip. - Phil Maguire, Philippe Moser, Rebecca Maguire, Virgil Griffith:

Is Consciousness Computable? Quantifying Integrated Information Using Algorithmic Information Theory. - Binbin Lin, Ji Yang, Xiaofei He, Jieping Ye:

Geodesic Distance Function Learning via Heat Flow on Vector Fields. - Kais Dukes:

Contextual Semantic Parsing using Crowdsourced Spatial Descriptions. - Ryutaroh Matsumoto:

Coding Theoretic Construction of Quantum Ramp Secret Sharing. - Anthony Bonato, David F. Gleich, Myunghwan Kim, Dieter Mitsche, Pawel Pralat, Amanda Tian, Stephen J. Young:

Dimensionality of social networks using motifs and eigenvalues. - Pierre de Buyl, Nelle Varoquaux:

Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013). - Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen, Yessin M. Neggaz:

Un algorithme de test pour la connexité temporelle des graphes dynamiques de faible densité. - Karim M. Mohamed, Mohamed A. Ismail, Nagia M. Ghanem:

VSCAN: An Enhanced Video Summarization using Density-based Spatial Clustering. - Amihood Amir, Timothy M. Chan, Moshe Lewenstein, Noa Lewenstein:

On Hardness of Jumbled Indexing. - Klesti Hoxha, Alda Kika, Eriglen Gani, Silvana Greca

:
Towards a Modular Recommender System for Research Papers written in Albanian. - Navya Chodisetti:

Analysis of Digital Knapsack Based Sealed Bid Auction. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Binary Fading Interference Channel with No CSIT. - Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:

Inference Control for Privacy-Preserving Genome Matching. - Sreejith T. Veetil, Kiran Kuchi, Radha Krishna Ganti:

Performance of PZF and MMSE Receivers in Cellular Networks with Multi-User Spatial Multiplexing. - Greg Castañón, Mohamed A. Elgharib, Venkatesh Saligrama, Pierre-Marc Jodoin:

Retrieval in Long Surveillance Videos using User Described Motion and Object Attributes. - Joe-Mei Feng, Felix Krahmer:

An RIP-based approach to $ΣΔ$ quantization for compressed sensing. - Federica Panella:

Approximate Query Answering in Inconsistent Databases. - James Whitacre, Sven Schellenberg, Antony Iorio:

Coal Blending: Business Value, Analysis, and Optimization. - Cláudia Nalon, João Marcos, Clare Dixon:

Clausal Resolution for Modal Logics of Confluence. - Alireza Goudarzi, Matthew R. Lakin, Darko Stefanovic:

Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks. - Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, C. Lawrence Zitnick:

Microsoft COCO: Common Objects in Context. - Anirban Bhattacharyya, Andrey Mokhov, Ken G. Pierce, Manuel Mazzara:

On Formalisms for Dynamic Reconfiguration of Dependable Systems. - Danko Adrovic, Jan Verschelde:

Computing all Affine Solution Sets of Binomial Systems. - Leonardo Aniello, Andrea Bondavalli, Andrea Ceccarelli, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Antonella Guzzo, Antonio Pecchia, Andrea Pugliese, Leonardo Querzoni, Stefano Russo:

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities. - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:

Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. - Yixin Cao, Luciano N. Grippo, Martín Darío Safe:

Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection. - Uzay Çetin, Haluk O. Bingol:

Iterated Prisoners Dilemma with limited attention. - Jody Sankey, Matthew K. Wright:

Dovetail: Stronger Anonymity in Next-Generation Internet Routing. - Umang Vipul:

Map-Reduce Parallelization of Motif Discovery. - Noémi Gaskó, Mihai Suciu, Rodica Ioana Lung, D. Dumitrescu:

Characterization and Detection of epsilon-Berge Zhukovskii Equilibria. - Meik Dörpinghaus, Günther Koliander, Giuseppe Durisi, Erwin Riegler, Heinrich Meyr:

Oversampling Increases the Pre-Log of Noncoherent Fading Channels. - Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:

Fatal Attractors in Parity Games: Building Blocks for Partial Solvers. - Mansoor Ebrahim, Shujaat Khan, UmerBin Khalid:

Symmetric Algorithm Survey: A Comparative Analysis. - Mansoor Ebrahim, Shujaat Khan, Syed Sheraz Ul Hasan Mohani:

Peer-to-Peer Network Simulators: an Analytical Review. - Sylwia Polberg:

Extension-based Semantics of Abstract Dialectical Frameworks. - Fábio M. Bayer, Renato J. Cintra, Arjuna Madanayake

, Uma Sadhvi Potluri:
Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding. - Thomas Janson, Christian Schindelhauer:

Ad-Hoc Network Unicast in Time O(log log n) using Beamforming. - Sachin Lakra, T. V. Prasad, G. Ramakrishna:

Representation of a Sentence using a Polar Fuzzy Neutrosophic Semantic Net. - Rodica Bozianu, Catalin Dima, Emmanuel Filiot:

Safraless Synthesis for Epistemic Temporal Specifications. - Shao-Meng Qin, Hai-Jun Zhou:

Solving the undirected feedback vertex set problem by local search. - Fabrizio Grandoni, Tomasz Kociumaka, Michal Wlodarczyk:

An LP-Rounding $2\sqrt{2}$ Approximation for Restricted Maximum Acyclic Subgraph. - Ambedkar Dukkipati, Nithish Pai, Maria Francis, Abhishek Dubey:

Macaulay-Buchberger Basis Theorem for Residue Class Rings with Torsion and Border Bases over Rings. - Mehryar Mohri, Michael D. Riley:

On the Disambiguation of Weighted Automata. - Mathias Niepert, Pedro M. Domingos:

Exchangeable Variable Models. - Ines Marusic, James Worrell:

Complexity of Equivalence and Learning for Multiplicity Tree Automata. - Sina Lashgari, Amir Salman Avestimehr:

Blind Wiretap Channel with Delayed CSIT. - Aviad Rubinstein:

Computational Complexity of Approximate Nash Equilibrium in Large Games. - Moya Chen, Doris Xin, Damien Woods:

Parallel computation using active self-assembly. - Nicolas T. Courtois:

On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies. - Radoslaw Michalski, Tomasz Kajdanowicz, Piotr Bródka, Przemyslaw Kazienko:

Seed Selection for Spread of Influence in Social Networks: Temporal vs. Static Approach. - Edward Hermann Haeusler:

How many times do we need and assumption ? - Sergei Gepshtein, Ivan Tyukin:

Optimal measurement of visual motion across spatial and temporal scales. - Antti Puurula, Jesse Read, Albert Bifet:

Kaggle LSHTC4 Winning Solution. - Omar S. Soliman, Eman AboElHamd:

Classification of Diabetes Mellitus using Modified Particle Swarm Optimization and Least Squares Support Vector Machine. - Jun Pang, Yang Liu:

Proceedings Third International Workshop on Engineering Safety and Security Systems, ESSS 2014, Singapore, Singapore, 13 May 2014. EPTCS 150, 2014 [contents] - Vladimir V. Rybakov:

A Note on Parameterised Knowledge Operations in Temporal Logic. - Vidit Sharma, Ashish Garg:

Numerical Investigation of Effects of Compound Angle and Length to Diameter Ratio on Adiabatic Film Cooling Effectiveness. - Ryoma Sin'ya, Kiminori Matsuzaki, Masataka Sassa:

Simultaneous Finite Automata: An Efficient Data-Parallel Model for Regular Expression Matching. - Lucas Antiqueira, Liang Zhao:

Spatial Neural Networks and their Functional Samples: Similarities and Differences. - Prabhjot Kaur:

Web Content Classification: A Survey. - (Withdrawn) On Lipschitz Continuity and Smoothness of Loss Functions in Learning to Rank.

- Sougata Chaudhuri, Ambuj Tewari:

Perceptron-like Algorithms and Generalization Bounds for Learning to Rank. - (Withdrawn) On the Construction of Maximum-Quality Aggregation Trees in Deadline-Constrained WSNs.

- Xuehan Xiong, Fernando De la Torre:

Supervised Descent Method for Solving Nonlinear Least Squares Problems in Computer Vision. - Aibek Makazhanov, Denilson Barbosa, Grzegorz Kondrak:

Extracting Family Relationship Networks from Novels. - James Brofos, Ajay Kannan, Rui Shu:

Automated Attribution and Intertextual Analysis. - Bin Li, Ruogu Li, Atilla Eryilmaz:

Throughput-Optimal Scheduling Design with Regular Service Guarantees in Wireless Networks. - Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, Patrick Totzke:

Infinite-State Energy Games. - Vimalkumar Jeyakumar, Abdul Kabbani, Jeffrey C. Mogul, Amin Vahdat:

Flexible Network Bandwidth and Latency Provisioning in the Datacenter. - Mario Mastriani:

Rule of Three for Superresolution of Still Images with Applications to Compression and Denoising. - Michael F. Nowlan, Jose M. Faleiro, Bryan Ford:

Crux: Locality-Preserving Distributed Systems. - Xiaojun Wan:

x-index: a fantastic new indicator for quantifying a scientist's scientific impact. - Djamal Ziani:

Feature Selection On Boolean Symbolic Objects. - Djamal Ziani:

Configuration in ERP SaaS Multi-Tenancy. - Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang:

NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security. - Rajet Krishnan, Mohammad Reza Khanzadi, N. Krishnan, Alexandre Graell i Amat, Thomas Eriksson, Nicolò Mazzali, Giulio Colavolpe:

On the Impact of Oscillator Phase Noise on the Uplink Performance in a Massive MIMO-OFDM System. - Mohammadreza Malek-Mohammadi, Magnus Jansson, Arash Owrang, Ali Koochakzadeh, Massoud Babaie-Zadeh:

DOA Estimation in Partially Correlated Noise Using Low-Rank/Sparse Matrix Decomposition. - Manaal Faruqui:

"Translation can't change a name": Using Multilingual Data for Named Entity Recognition. - Bo Cheng, Ling Cheng:

Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity. - Kangqi Liu, Meixia Tao:

Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels. - Matthias Nickles, Alessandra Mileo:

Probabilistic Inductive Logic Programming Based on Answer Set Programming. - Hua Sun, Sundar R. Krishnamurthy, Syed Ali Jafar:

Rank Matching for Multihop Multiflow. - Euiwoong Lee:

Hardness of Graph Pricing through Generalized Max-Dicut. - Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:

A Brief History of Web Crawlers. - Paul Accisano, Alper Üngör:

Finding a Curve in a Point Set. - Yonghong Yu, Can Wang, Yang Gao:

Attributes Coupling based Item Enhanced Matrix Factorization Technique for Recommender Systems. - Peng He, Bing Li, Deguang Zhang, Yutao Ma:

Simplification of Training Data for Cross-Project Defect Prediction. - Jingbo Liu, Emmanuel Abbe:

Polynomial complexity of polar codes for non-binary alphabets, key agreement and Slepian-Wolf coding. - John C. Duchi, Michael I. Jordan, Martin J. Wainwright, Yuchen Zhang:

Information-theoretic lower bounds for distributed statistical estimation with communication constraints. - Vishal Anand, Ramani S:

Fault Localization in a Software Project using Back-Tracking Principles of Matrix Dependency. - Tarushi Sharma, AmanPreet Kaur:

Analysis of Email Fraud detection using WEKA Tool. - Martin Skutella:

A note on the ring loading problem. - Hasan Abasi, Nader H. Bshouty, Hanna Mazzawi:

On Exact Learning Monotone DNF from Membership Queries. - Valmi Dufour-Lussier, Alice Hermann, Florence Le Ber, Jean Lieber:

Belief revision in the propositional closure of a qualitative algebra (extended version). - Hannes Strass:

On the Relative Expressiveness of Argumentation Frameworks, Normal Logic Programs and Abstract Dialectical Frameworks. - Xianrui Li, D. B. Pei, Q. Liu, Rui Shen:

Design of a capacitor-less low-dropout voltage regulator. - Jianmin Ji, Hannes Strass:

Implementing Default and Autoepistemic Logics via the Logic of GK. - P. Sakthivel, P. Krishna Sankar:

Multi-Path Routing and Wavelength Assignment (RWA) Algorithm for WDM Based Optical Networks. - Sascha Kurz:

Ready for the design of voting rules? - Serguei Kaniovski, Sascha Kurz:

The average representation - a cornucopia of power indices? - Alexander Zimin, Rasmus Ibsen-Jensen, Krishnendu Chatterjee:

Generalized Risk-Aversion in Stochastic Multi-Armed Bandits. - Krishnendu Chatterjee, Martin Chmelik, Przemyslaw Daca:

CEGAR for Qualitative Analysis of Probabilistic Systems. - Marcin Wrochna:

Reconfiguration in bounded bandwidth and treedepth. - Sergey Goncharov, Lutz Schröder, Christoph Rauch:

(Co-)Algebraic Foundations for Effect Handling and Iteration. - Florian Kammueller:

Confinement for Active Objects. - Zhana Bao:

Finding Inner Outliers in High Dimensional Space. - Zhana Bao:

Robust Subspace Outlier Detection in High Dimensional Space. - Marco Maratea, Luca Pulina, Francesco Ricca:

The Multi-engine ASP Solver ME-ASP: Progress Report. - Simon Kramer:

A Galois-Connection between Cattell's and Szondi's Personality Profiles. - Grzegorz Orynczak, Marcin Jakubek, Karol Wawrzyniak, Michal Klos:

Market Coupling as the Universal Algorithm to Assess Zonal Divisions. - Yanina Shkel, Vincent Y. F. Tan, Stark C. Draper:

Unequal Message Protection: Asymptotic and Non-Asymptotic Tradeoffs. - John S. H. Baxter

, Martin Rajchl, Jing Yuan, Terry M. Peters:
A Continuous Max-Flow Approach to Multi-Labeling Problems under Arbitrary Region Regularization. - Xu Chen, Dongning Guo:

Many-Access Channels: The Gaussian Case with Random User Activities. - Talha Cihad Gülcü, Alexander Barg:

Interactive Function Computation via Polar Coding. - Matthias Henze, Rafel Jaume:

Bottleneck Partial-Matching Voronoi Diagrams. - Michelle Krüger Silvéria:

Virtual Windshields: Merging Reality and Digital Content to Improve the Driving Experience. - Hayder Raheem Hashim

:
The Discrete Logarithm problem in the ElGamal cryptosystem over the abelian group U(n) Where n= p^m, or 2p^m. - Riccardo Zese:

Reasoning with Probabilistic Logics. - Chandranath Adak:

Gabor Filter and Rough Clustering Based Edge Detection. - Fabio L. Traversa, Massimiliano Di Ventra:

Universal Memcomputing Machines. - Mario Mastriani:

Lossless compression catalyst based on binary allocation via modular arithmetic. - Mohit Jha, Shailja Shukla:

Design Of Fuzzy Logic Traffic Controller For Isolated Intersections With Emergency Vehicle Priority System Using MATLAB Simulation. - Elena Cabrio, Serena Villata:

Towards a Benchmark of Natural Language Arguments. - Joseph Cheriyan, Zhihan Gao, Konstantinos Georgiou, Sahil Singla:

On Integrality Ratios for Asymmetric TSP in the Sherali-Adams Hierarchy. - Tomás Kociský, Karl Moritz Hermann, Phil Blunsom:

Learning Bilingual Word Representations by Marginalizing Alignments. - Ulrike Barthelmess, Ulrich Furbach:

Do we need Asimov's Laws? - (Withdrawn) Verifiable Privacy-Preserving Member and Order Queries on a List.

- Tsung-Yi Chen, Xu Chen, Dongning Guo:

Many-Broadcast Channels: Definition and Capacity in the Degraded Case. - Shiqi Zhang, Mohan Sridharan, Michael Gelfond, Jeremy L. Wyatt:

KR$^3$: An Architecture for Knowledge Representation and Reasoning in Robotics. - Glencora Borradaile, Theresa Migler, Gordon T. Wilfong:

Density decompositions of networks. - Mohammad Rastegari, Shobeir Fakhraei, Jonghyun Choi, David W. Jacobs, Larry S. Davis:

Comparing apples to apples in the evaluation of binary coding methods. - Mate Boban:

Realistic and Efficient Channel Modeling for Vehicular Networks. - V. C. K. P. Arul Oli, Elayaraja Ponram:

Wireless Fidelity Real Time Security System. - Siddhartha Mukherjee:

Study on performance improvement of oil paint image filter algorithm using parallel pattern library. - Zhana Bao:

K-NS: Section-Based Outlier Detection in High Dimensional Space. - Elisa Gorla, Maike Massierer:

Index Calculus in the Trace Zero Variety. - Hien Quoc Ngo, Himal A. Suraweera, Michail Matthaiou

, Erik G. Larsson:
Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing. - Jean-François Baget, Fabien Garreau, Marie-Laure Mugnier, Swan Rocher:

Revisiting Chase Termination for Existential Rules and their Extension to Nonmonotonic Negation. - Narada Wickramage:

Rapture in the Cartesian Wall between Real World Entities and their Abstract Models. - David T. H. Kao, Amir Salman Avestimehr:

Linear Degrees of Freedom of the MIMO X-Channel with Delayed CSIT. - Joel A. Tropp:

Convex recovery of a structured signal from independent random linear measurements. - Szabolcs Iván:

On state complexity of unions of binary factor-free languages. - Étienne André

, Mohamed Mahdi Benmoussa, Christine Choppy:
Translating UML State Machines to Coloured Petri Nets Using Acceleo: A Report. 1-7 - Julien Brunel, Laurent Rioux, Stéphane Paul, Anthony Faucogney, Frédérique Vallée:

Formal Safety and Security Assessment of an Avionic Architecture with Alloy. 8-19 - Cornelius Diekmann

, Lars Hupel
, Georg Carle:
Directed Security Policies: A Stateful Network Implementation. 20-34 - Gurvan Le Guernic:

In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft. 50-55 - David Hauzar, Jan Kofron

, Pavel Bastecký:
Data-flow Analysis of Programs with Associative Arrays. 56-70 - Alex Dytso, Daniela Tuninetti, Natasha Devroye:

On the Two-user Interference Channel with Partial Codebook Knowledge at one Receiver. - Yishi Zhang, Chao Yang, Chan Xiong, Xingchi Zhou, Zigang Zhang:

Feature selection for classification with class-separability strategy and data envelopment analysis. - Marcello Balduccini, William C. Regli, Duc N. Nguyen:

An ASP-Based Architecture for Autonomous UAVs in Dynamic Environments: Progress Report. - Wanchun Jiang, Fengyuan Ren, Xin Yue, Chuang Lin:

Scale Congestion Control to Ultra-High Speed Ethernet. - Vikram Krishnamurthy, Omid Namvar Gharehshiran, Maziyar Hamdi:

Interactive Sensing and Decision Making in Social Networks. - Ali Bou Nassif, Luiz Fernando Capretz, Danny Ho:

Analyzing the Non-Functional Requirements in the Desharnais Dataset for Software Effort Estimation. - Ioana Oriana Bercea, Navin Goyal, David G. Harris, Aravind Srinivasan:

On Computing Maximal Independent Sets of Hypergraphs in Parallel. - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Approximate Capacity of the Two-User MISO Broadcast Channel with Delayed CSIT. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:

Analysis of Degrees of Freedom of Wideband Random Multipath Fields Observed Over Time and Space Windows. - Hatem Abou-zeid, Hossam S. Hassanein, Stefan Valentin, Mohamed Fathy Feteiha:

A Lookback Scheduling Framework for Long-Term Quality-of-Service Over Multiple Cells. - Yishun Dong, Farzan Farnia, Ayfer Özgür:

Near Optimal Energy Control and Approximate Capacity of Energy Harvesting Communication. - Hani A. Qudaih, Mohammed A. Bawazir, Shuaibu Hassan Usman, Jamaludin Ibrahim:

Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization. - George Saad, Jared Saia:

Self-Healing Computation. - Daniel Le Berre:

Some thoughts about benchmarks for NMR. - Ulrich Furbach, Claudia Schon:

Semantically Guided Evolution of SHI ABoxes. - Petros T. Boufounos, Laurent Jacques, Felix Krahmer, Rayan Saab:

Quantization and Compressive Sensing. - Robert Mingesz, Gergely Vadai, Zoltan Gingl:

What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? - Jian Yang, Jianjun Qian, Lei Luo, Fanlong Zhang, Yicheng Gao:

Nuclear Norm based Matrix Regression with Applications to Face Recognition with Occlusion and Illumination Changes. - Oscar M. Danielsson, Omid Aghazadeh:

Human Pose Estimation from RGB Input Using Synthetic Training Data. - Francisco Claude, Gonzalo Navarro, Alberto Ordóñez Pereira:

Efficient Compressed Wavelet Trees over Large Alphabets. - Sergio Cabello, Otfried Cheong, Lena Schlipf:

Finding Largest Rectangles in Convex Polygons. - Shahab Tasharrofi, Eugenia Ternovska:

Three Semantics for Modular Systems. - Abhishek Awasthi, Jörg Lässig, Oliver Kramer:

A Novel Approach to the Common Due-Date Problem on Single and Parallel Machines. - Jon M. Kleinberg, Sigal Oren:

Time-Inconsistent Planning: A Computational Problem in Behavioral Economics. - Mario Alviano, Wolfgang Faber:

Semantics and Compilation of Answer Set Programming with Generalized Atoms. - Everardo Bárcenas

, Jesús Lavalle:
Global Numerical Constraints on Trees. - Michael X. Zhou:

Classic Lagrangian may not be applicable to the traveling salesman problem. - Giorgos Kouropoulos

:
Calculation software for efficiency and penetration of a fibrous filter medium based on the mathematical models of air filtration. - Brijender Kahanwal:

Comparative Study of the Function Overloading and Function Overriding Using C++. - Akhlaqur Rahman, Sumaira Tasnim:

Application of Machine Learning Techniques in Aquaculture. - Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:

What's the Gist? Privacy-Preserving Aggregation of User Profiles. - Rachel A. Ward:

A unified framework for linear dimensionality reduction in l1. - Wilhelmiina Hämäläinen:

General upper bounds for well-behaving goodness measures on dependency rules. - Olena Orobinska:

Automatic Method Of Domain Ontology Construction based on Characteristics of Corpora POS-Analysis. - Stefan Fafianie, Stefan Kratsch:

Streaming Kernelization. - Michael Kai Petersen:

When push comes to shove verbs literally shake due to latent semantic parameters of size and intensity. - Wilhelmiina Hämäläinen:

Assessing the statistical significance of association rules. - Namyoon Lee, David Morales-Jiménez, Angel E. Lozano, Robert W. Heath Jr.:

Spectral Efficiency of Dynamic Coordinated Beamforming: A Stochastic Geometry Approach. - Naman Agarwal, Guy Kindler, Alexandra Kolla, Luca Trevisan:

Unique Games on the Hypercube. - Ramin Pichevar, Jason Wung, Daniele Giacobello, Joshua Atkins:

Design and Optimization of a Speech Recognition Front-End for Distant-Talking Control of a Music Playback Device. - Calvin Newport:

Consensus with an Abstract MAC Layer. - Xiaozhe Wang, Hsiao-Dong Chiang:

Quasi Steady-State Model for Power System Stability: Limitations, Analysis and a Remedy. - Shamanth Kumar, Huan Liu, Sameep Mehta, L. Venkata Subramaniam:

From Tweets to Events: Exploring a Scalable Solution for Twitter Streams. - Shamim Ripon, Aoyan Barua, Mohammad Salah Uddin:

Analysis Tool for UNL-Based Knowledge Representation. - Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard:

New Algorithmic Approaches to Point Constellation Recognition. - Rui Song, Hyunsuk Ko, C.-C. Jay Kuo:

MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source. - Omar S. Soliman, Aliaa Rassem:

A Network Intrusions Detection System based on a Quantum Bio Inspired Algorithm. - Sallam Abualhaija, Karl-Heinz Zimmermann:

D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation. - Justin Cheng, Cristian Danescu-Niculescu-Mizil, Jure Leskovec:

How Community Feedback Shapes User Behavior. - Siamak Ravanbakhsh, Russell Greiner, Brendan J. Frey:

Training Restricted Boltzmann Machine by Perturbation. - Chenhao Tan, Lillian Lee, Bo Pang:

The effect of wording on message propagation: Topic- and author-controlled natural experiments on Twitter. - Chenhao Tan, Lillian Lee:

A Corpus of Sentence-level Revisions in Academic Writing: A Step towards Understanding Statement Strength in Communication. - Yimin Yang, Q. M. Jonathan Wu, Guangbin Huang, Yaonan Wang:

Pulling back error to the hidden-node parameter technology: Single-hidden-layer feedforward network without output weight. - Flavio Figueiredo, Jussara M. Almeida, Yasuko Matsubara, Bruno Ribeiro, Christos Faloutsos:

Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries. - Daniel Cullina, Negar Kiyavash:

Generalized sphere-packing and sphere-covering bounds on the size of codes for combinatorial channels. - Flávio du Pin Calmon, Mayank Varia, Muriel Médard:

An Exploration of the Role of Principal Inertia Components in Information Theory. - Charalampos E. Tsourakakis:

A Novel Approach to Finding Near-Cliques: The Triangle-Densest Subgraph Problem. - Danai Koutra, Paul N. Bennett, Eric Horvitz:

Events and Controversies: Influences of a Shocking News Event on Information Seeking. - Abdul Quamar, Amol Deshpande, Jimmy Lin:

NScale: Neighborhood-centric Large-Scale Graph Analytics in the Cloud. - Esa Ollila, Hyon-Jung Kim, Visa Koivunen:

Robust iterative hard thresholding for compressed sensing. - Corinna Cortes, Mehryar Mohri, Andres Muñoz Medina:

Adaptation Algorithm and Theory Based on Generalized Discrepancy. - Manju Kaushik:

System Software: Concepts and Approach. - Sascha Kurz, Nicola Maaser, Stefan Napel, Matthias Weber:

Mostly Sunny: A Forecast of Tomorrow's Power Index Research. - Neha Gupta, Ponnurangam Kumaraguru:

Exploration of gaps in Bitly's spam detection and relevant counter measures. - Maria Spichkova:

Stream processing components: Isabelle/HOL formalisation and case studies. - Ibrahim M. Alabdulmohsin:

A Mathematical Theory of Learning. - A. Bhuvaneswari, E. George Dharma Prakash Raj, V. Sinthu Janita Prakash:

ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff. - Hanéne Mkaouar, Olfa Boubaker:

Compliant motion control for handling a single object by two similar industrial robots. - Holger H. Hoos, Marius Lindauer, Torsten Schaub:

claspfolio 2: Advances in Algorithm Selection for Answer Set Programming. - Bart Bogaerts, Joachim Jansen, Maurice Bruynooghe, Broes De Cat, Joost Vennekens, Marc Denecker:

Simulating dynamic systems using Linear Time Calculus theories. - Mohammad Mohammadi, Shahram Jafari:

An expert system for recommending suitable ornamental fish addition to an aquarium based on aquarium condition. - Hasan Abasi, Ali Z. Abdi, Nader H. Bshouty:

Learning Boolean Halfspaces with Small Weights from Membership Queries. - Ilya V. Otpuschennikov, Alexander A. Semenov, Stepan Kochemazov:

Transalg: a Tool for Translating Procedural Descriptions of Discrete Functions to SAT (Tool Paper). - Thomas Given-Wilson

, Daniele Gorla
, Barry Jay:
A Concurrent Pattern Calculus. - Sedat Görmüs, Mohammud Zubeir Bocus:

Efficient Cooperative Anycasting for AMI Mesh Networks. - Olaf Beyersdorff, Leroy Chew:

Tableau vs. Sequent Calculi for Minimal Entailment. - Jin-Li Guo, Qi Suo:

Comment on "Quantifying Long-term Scientific Impact". - Marcos Cramer, Pieter Van Hertum, Diego Agustín Ambrossio, Marc Denecker:

Modelling Delegation and Revocation Schemes in IDP. - Walid Gomaa:

Computability and Complexity over the Product Topology of Real Numbers. - Photios A. Stavrou, Christos K. Kourtellaris, Charalambos D. Charalambous:

Information Nonanticipative Rate Distortion Function and Its Applications. - Jacopo Staiano, Marco Guerini:

DepecheMood: a Lexicon for Emotion Analysis from Crowd-Annotated News. - Julie De Pril, János Flesch, Jeroen Kuipers, Gijs Schoenmakers, Koos Vrieze:

Existence of Secure Equilibrium in Multi-Player Games with Perfect Information. - Valerio Capraro, Conor Smyth, Kalliopi Mylona, Graham Niblo:

Benevolent characteristics promote cooperative behaviour among humans. - Victor Sadikov, Walter Pidkameny:

Complete Separation of the 3 Tiers - Divide and Conquer. - Zheng Wang, Cong Ling, Guillaume Hanrot:

Markov Chain Monte Carlo Algorithms for Lattice Gaussian Sampling. - Jie Fu, Rayna Dimitrova, Ufuk Topcu:

Abstractions and sensor design in partial-information, reactive controller synthesis. - Shay Kutten, Danupon Nanongkai, Gopal Pandurangan, Peter Robinson:

Distributed Symmetry Breaking in Hypergraphs. - Abuzer Yakaryilmaz, A. C. Cem Say, H. Gökalp Demirci:

Debates with small transparent quantum verifiers. - Ankit Garg, Tengyu Ma, Huy L. Nguyen:

Lower Bound for High-Dimensional Statistical Learning Problem via Direct-Sum Theorem. - Mohsen Ghaffari, Erez Kantor, Nancy A. Lynch, Calvin C. Newport:

Multi-Message Broadcast with Abstract MAC Layers and Unreliable Links. - Stefano Teso, Roberto Sebastiani, Andrea Passerini:

Structured Learning Modulo Theories. - (Withdrawn) RPCA-KFE: Key Frame Extraction for Consumer Video based Robust Principal Component Analysis.

- Chris Kimble:

What Cost Knowledge Management? The Example of Infosys. - (Withdrawn) Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance.

- Christoph Lenzen, Nancy A. Lynch, Calvin C. Newport, Tsvetomira Radeva:

Trade-offs between Selection Complexity and Performance when Searching the Plane without Communication. - Ling Fang, Yoriyuki Yamagata

, Yutaka Oiwa:
Evaluation of A Resilience Embedded System Using Probabilistic Model-Checking. 35-49 - Raman Grover, Michael J. Carey:

Scalable Fault-Tolerant Data Feeds in AsterixDB. - Kutlu Emre Yilmaz:

Entropy Based Cartoon Texture Separation. - Tiep Le, Enrico Pontelli, Tran Cao Son, William Yeoh:

Logic and Constraint Logic Programming for Distributed Constraint Optimization. - Kutlu Emre Yilmaz, Ahmet Arslan, Özgür Yilmazel:

Turkish Text Retrieval Experiments Using Lemur Toolkit. - Bluma Gelley, Ajita John:

Like, Comment, Repin: User Interaction on Pinterest. - Massimo Franceschetti:

On Landau's eigenvalue theorem and information cut-sets. - Arka Bhattacharya:

Approximation Algorithms for the Asymmetric Traveling Salesman Problem : Describing two recent methods. - Ritesh Kolte, Ayfer Özgür, Suhas N. Diggavi:

When are dynamic relaying strategies necessary in half-duplex wireless networks? - Melika Abolhassani, MohammadHossein Bateni, MohammadTaghi Hajiaghayi, Hamid Mahini, Anshul Sawant:

Network Cournot Competition. - Hamed Haddadi, Georgios Smaragdakis, K. K. Ramakrishnan:

Opportunities in a Federated Cloud Marketplace. - Muthuraman Thangaraj, V. Gayathri:

A Retrieval Mechanism for Multi-versioned Digital Collection Using TAG. - Deepjoy Das, Sarat Saharia:

Implementation And Performance Evaluation Of Background Subtraction Algorithms. - N. V. S. N. Sarma, Mahesh Gopi:

Energy Efficient Clustering using Jumper Firefly Algorithm in Wireless Sensor Networks. - Haifa Mehdi, Olfa Boubaker:

Robust Tracking Control for Constrained Robots. - Ahmed Saeed, Azin Neishaboori, Amr Mohamed, Khaled A. Harras:

Up and Away: A Cheap UAV Cyber-Physical Testbed (Work in Progress). - Lorenz Klaus:

A Strongly Polynomial Reduction for Linear Programs over Grids. - Bart Bogaerts, Joost Vennekens, Marc Denecker, Jan Van den Bussche:

FO(C): A Knowledge Representation Language of Causality. - Meng Guo, Jana Tumova, Dimos V. Dimarogonas:

Cooperative Decentralized Multi-agent Control under Local LTL Tasks and Connectivity Constraints. - Emanuel Lacic, Dominik Kowald, Lukas Eberhard, Christoph Trattner, Denis Parra, Leandro Balby Marinho:

Utilizing Online Social Network and Location-Based Data to Recommend Items in an Online Marketplace. - Javier Esparza:

Keeping a Crowd Safe: On the Complexity of Parameterized Verification (Corrected version). - Emanuel Lacic, Dominik Kowald, Christoph Trattner:

SocRecM: A Scalable Social Recommender Engine for Online Marketplaces. - P. Cynthia Selvi, A. R. Mohammed Shanavas:

Output Privacy Protection With Pattern-Based Heuristic Algorithm. - Hisham Elshaer, Federico Boccardi, Mischa Dohler, Ralf Irmer:

Downlink and Uplink Decoupling: a Disruptive Architectural Design for 5G Networks. - Atreyee Kundu, Niranjan Balachandran, Debasish Chatterjee:

Algorithmic synthesis of stabilizing switching signals for discrete-time switched linear systems. - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:

Modeling Bitcoin Contracts by Timed Automata. - Bojana Koteska, Anastas Misev:

Change Management and Version Control of Scientific Applications. - Valery A. Ugrinovskii, Emilia Fridman:

A Round-Robin Type Protocol for Distributed Estimation with H∞ Consensus. - Antonia Wachter-Zeh, Tuvi Etzion:

Optimal Ferrers Diagram Rank-Metric Codes. - Kristina Ban, Ana Mestrovic, Sanda Martincic-Ipsic:

Initial Comparison of Linguistic Networks Measures for Parallel Texts. - Michael Hoffmann, Vincent Kusters, Tillmann Miltzow:

Halving Balls in Deterministic Linear Time. - Christian Schulz, Christoph von Tycowicz, Hans-Peter Seidel, Klaus Hildebrandt:

Proofs of two Theorems concerning Sparse Spacetime Constraints. - Márta Czenky:

The Efficiency Examination of Teaching of Different Normalization Methods. - Kazuki Kajiwara, Tuan Phung-Duc:

Asymptotic and Numerical Analysis of Multiserver Retrial Queue with Guard Channel for Cellular Networks. - Tebbi Hanane, Azzoune Hamid:

An Expert System for Automatic Reading of A Text Written in Standard Arabic. - Kimia Ghaffari, Mohammad Soltani Delgosha, Neda Abdolvand:

Towards Cloud Computing: A SWOT Analysis on its Adoption in SMEs. - Mohamed A. Hassan:

Hybrid Intelligent System; A Self-Adaptive Network Protection System "Using Soft Computing and Open-Source Tools". - Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato:

Distributed Interference-Aware Energy-Efficient Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks. - Antimo Barbato, Antonio Capone, Lin Chen, Fabio Martignon, Stefano Paris:

A Distributed Demand-Side Management Framework for the Smart Grid. - Ayushi Sinha, William R. Gray Roncal, Narayanan Kasthuri, Jeff W. Lichtman, Randal C. Burns, Michael M. Kazhdan:

Automatic Annotation of Axoplasmic Reticula in Pursuit of Connectomes using High-Resolution Neural EM Data. - M. Rajalakshmi, P. Subashini:

Texture Based Image Segmentation of Chili Pepper X-Ray Images Using Gabor Filter. - Prajakta P. Khairnar, C. A. Manjare:

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms. - Sergio Consoli, José Andrés Moreno-Pérez, Kenneth Darby-Dowman, Nenad Mladenovic:

Mejora de la exploracion y la explotacion de las heuristicas constructivas para el MLSTP. - John Francisco, Victor Sadikov:

Structured Approach to Web Development. - Mohamed Mbida, Abdellah Ezzati:

OSCMAC Duty Cycle with Multi Helpers CT Mode WILEM Technology in Wireless Sensor Networks. - William A. Sethares, Selçuk S. Bayin:

Model-Driven Applications of Fractional Derivatives and Integrals. - Amr Abdelnasser, Ekram Hossain, Dong In Kim:

Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks. - Christoph Lenzen, Boaz Patt-Shamir:

Improved Distributed Steiner Forest Construction. - Ahmed Hamdi Sakr, Ekram Hossain:

Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis. - Hesham ElSawy, Ekram Hossain:

Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks. - Tobias Fehenberger, Norbert Hanik:

Mutual Information as a Figure of Merit for Optical Fiber Systems. - Rahali Bochra, Mohammed Feham, Junwu Tao:

Analysis of S Band Substrate Integrated Waveguide Power Divider, Circulator and Coupler. - Hsien-Pu Chen, Laszlo B. Kish, Claes-Goran Granqvist, Gabor Schmera:

On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott. - Jeffrey Sukharev, Leonid Zhukov, Alexandrin Popescul:

Learning Alternative Name Spellings. - K. Sankeerth Rao, Vinod M. Prabhakaran:

A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels. - Ari Saptawijaya, Luís Moniz Pereira:

Joint Tabling of Logic Program Abductions and Updates. - Sriram Vajapeyam:

Understanding Shannon's Entropy metric for Information. - Pengfei Wan, Gene Cheung, Philip A. Chou, Dinei A. F. Florêncio, Cha Zhang, Oscar C. Au:

Precision Enhancement of 3D Surfaces from Multiple Compressed Depth Maps. - Bob J. Scurlock:

Use of ARAS 360 to Facilitate Rapid Development of Articulated Total Body Biomechanical Physics Simulations. - Jehad Al-Dallal:

How and When to Flatten Java Classes? - Chris Kimble:

Electronic Health Records: Cure-all or Chronic Condition? - Osvaldo Simeone, Elza Erkip, Shlomo Shamai:

Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint. - Anna Ma, Arjuna Flenner, Deanna Needell, Allon G. Percus:

Improving Image Clustering using Sparse Text and the Wisdom of the Crowds. - Zoltán Szabó:

Information Theoretical Estimators Toolbox. - Yanting Ma, Jin Tan, Nikhil Krishnan, Dror Baron:

Empirical Bayes and Full Bayes for Signal Estimation. - Xiaohao Cai:

Variational Image Segmentation Model Coupled with Image Restoration Achievements. - Arash Batni, Farshad Safaei:

A New Multi-Tiered Solid State Disk Using Slc/Mlc Combined Flash Memory. - Farhana Bashar, S. M. Akramus Salehin, Thushara D. Abhayapala:

Band Limited Signals Observed Over Finite Spatial and Temporal Windows: An Upper Bound to Signal Degrees of Freedom. - Elham Shadkam, Mehdi Bijari:

Evaluation The Efficiency Of Cuckoo Optimization Algorithm. - Madhumangal Pal, Anita Pal:

Scheduling algorithm to select $k$ optimal programme slots in television channels: A graph theoretic approach. - Dani Korpi, Lauri Anttila, Mikko Valkama:

Reference Receiver Aided Digital Self-Interference Cancellation in MIMO Full-Duplex Transceivers. - Dirk Lewandowski:

Evaluating the retrieval effectiveness of Web search engines using a representative query sample. - Dirk Lewandowski:

Why we need an independent index of the Web. - Nilesh Khambekar, Chad M. Spooner, Vipin Chaudhary:

Going Towards Discretized Spectrum Space: Quantification of Spectrum Consumption Spaces and a Quantified Spectrum Access Paradigm. - Stefano Rini, Shlomo Shamai:

On Capacity of the Dirty Paper Channel with Fading Dirt in the Strong Fading Regime. - Fatima Zohra Hadjam, Claudio Moraga:

Introduction to RIMEP2: A Multi-Expression Programming System for the Design of Reversible Digital Circuits. - Saptarshi Chakraborty, Dhrubajyoti Das:

An Overview of Face Liveness Detection. - Le Li, Jianjun Yang, Kaili Zhao, Yang Xu, Honggang Zhang, Zhuoyi Fan:

Graph Regularized Non-negative Matrix Factorization By Maximizing Correntropy. - Michael S. Gashler, Stephen C. Ashmore:

Training Deep Fourier Neural Networks To Fit Time-Series Data. - Camellia Ray, Jayanta Kumar Das, Pabitra Pal Choudhury:

On Analysis and Generation of some Biologically Important Boolean Functions. - Robert J. Lyon, J. M. Brooke, Joshua D. Knowles, Benjamin W. Stappers:

Hellinger Distance Trees for Imbalanced Streams. - Frank Hannig, Jürgen Teich:

Proceedings of the First Workshop on Resource Awareness and Adaptivity in Multi-Core Computing (Racing 2014). - Shaofeng Zou, Yingbin Liang, H. Vincent Poor, Xinghua Shi:

Nonparametric Detection of Anomalous Data via Kernel Mean Embedding. - Andrés Altieri, Pablo Piantanida, Leonardo Rey Vega, Cecilia G. Galarza:

On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks. - Thomas Bläsius, Guido Brückner, Ignaz Rutter:

Complexity of Higher-Degree Orthogonal Graph Embedding in the Kandinsky Model. - Piero Giacomelli, Åsa Smedberg:

The Eve of 3D Printing in Telemedicine: State of the Art and Future Challenges. - Bryan Poling, Gilad Lerman, Arthur Szlam:

Better Feature Tracking Through Subspace Constraints. - Elaine Pimentel, Carlos Olarte, Vivek Nigam:

A Proof Theoretic Study of Soft Concurrent Constraint Programming. - Sawood Alam, Charles L. Cartledge, Michael L. Nelson:

Support for Various HTTP Methods on the Web. - Jan Hazla, Thomas Holenstein:

Upper Tail Estimates with Combinatorial Proofs. - Yan Fang, Matthew J. Cotter, Donald M. Chiarulli, Steven P. Levitan:

Image Segmentation Using Frequency Locking of Coupled Oscillators. - Shahab Kaynama, Jeremy H. Gillula, Claire J. Tomlin:

A sampling-based approach to scalable constraint satisfaction in linear sampled-data systems - Part I: Computation. - Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:

A Methodology for Information Flow Experiments. - Oswin Aichholzer, Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Michael Hoffmann, Anna Lubiw, Jack Snoeyink, Andrew Winslow:

Covering Folded Shapes. - Srayan Datta:

Predicting Central Topics in a Blog Corpus from a Networks Perspective. - Meng Wang, Tharaka Samarasinghe, Jamie S. Evans:

Transmission Rank Selection for Opportunistic Beamforming with Quality of Service Constraints. - Alexis Huck, François de Vieilleville, Pierre Weiss, Manuel Grizonnet:

Hyperspectral pan-sharpening: a variational convex constrained formulation to impose parallel level lines, solved with ADMM. - Norikazu Sugimoto, Voot Tangkaratt, Thijs Wensveen, Tingting Zhao, Masashi Sugiyama, Jun Morimoto:

Efficient Reuse of Previous Experiences to Improve Policies in Real Environment. - Reto Speck, Tobias Blanke, Conny Kristel, Michal Frankl, Kepa Joseba Rodríguez, Veerle Vanden Daelen:

The Past and the Future of Holocaust Research: From Disparate Sources to an Integrated European Holocaust Research Infrastructure. - Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann:

G4LTL-ST: Automatic Generation of PLC Programs. - Md. Habibur Rahman, Mohammad Nasiruddin:

Impact of Two Realistic Mobility Models for Vehicular Safety Applications. - Kerstin Andersson:

Exact Probability Distribution versus Entropy. - Amit Daniely, Shai Shalev-Shwartz:

Optimal Learners for Multiclass Problems. - Stefano Riverso, Fabio Sarzo, Giancarlo Ferrari-Trecate

:
Plug-and-play voltage and frequency control of islanded microgrids with meshed topology. - Florent Foucaud

, George B. Mertzios, Reza Naserasr, Aline Parreau, Petru Valicov:
Identification, location-domination and metric dimension on interval and permutation graphs. - Giuseppe Antonio Di Luna, Paola Flocchini, Sruti Gan Chaudhuri, Nicola Santoro, Giovanni Viglietta:

Robots with Lights: Overcoming Obstructed Visibility Without Colliding. - Lijiang Chen:

Coordinate System Selection for Minimum Error Rate Training in Statistical Machine Translation. - A. N. Trahtman:

The length of a minimal synchronizing word and the Černy conjecture. - Amer E. Mouawad, Naomi Nishimura, Venkatesh Raman, Marcin Wrochna:

Reconfiguration over tree decompositions. - Nima Anari, Gagan Goel, Afshin Nikzad:

Mechanisms Design for Crowdsourcing: An Optimal 1-1/e Approximate Budget-Feasible Mechanism for Large Markets. - Moshe Schwartz, Muriel Médard:

Quasi-linear Network Coding. - Götz E. Pfander, Pavel Zheltov:

Estimation of Overspread Scattering Functions. - Achilles Beros, Colin de la Higuera:

A Canonical Semi-Deterministic Transducer. - Nicola Gatti, Alessandro Lazaric, Marco Rocco, Francesco Trovò:

Truthful Learning Mechanisms for Multi-Slot Sponsored Search Auctions with Externalities. - Zubair Nabi:

The Zen of Graduate-level Programming. - Hamidreza Boostanimehr, Vijay K. Bhargava:

Unified and Distributed QoS-Driven Cell Association Algorithms in Heterogeneous Networks. - Luciano Caroprese, Irina Trubitsyna, Miroslaw Truszczynski, Ester Zumpano:

A Measure of Arbitrariness in Abductive Explanations. - Jeffrey M. Druce, Jarvis D. Haupt, Stefano Gonella:

Anomaly-Sensitive Dictionary Learning for Unsupervised Diagnostics of Solid Media. - Roman Barták, Neng-Fa Zhou:

Using Tabled Logic Programming to Solve the Petrobras Planning Problem. - Hadassa Daltrophe, Shlomi Dolev, Zvi Lotker:

Big Data Representation as High Dimensional Configuration. - Zubair Nabi:

A $35 Firewall for the Developing World. - Nikzad Babaii Rizvandi:

Performance Provisioning and Energy Efficiency in Cloud and Distributed Computing Systems. - Chulong Liang, Xiao Ma, Qiutao Zhuang, Baoming Bai:

Spatial Coupling of Generator Matrix: A General Approach to Design of Good Codes at a Target BER. - Dor Arad, Yael Mordechai, Hadas Shachnai:

Tighter Bounds for Makespan Minimization on Unrelated Machines. - Neng-Fa Zhou:

Combinatorial Search With Picat. - Dushyant Vaghela, Kapildev Naina:

A Review of Image Mosaicing Techniques. - Ryoma Sin'ya:

Graph Spectral Properties of Deterministic Finite Automata. - Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:

How to Securely Compute the Modulo-Two Sum of Binary Sources. - George Souza Oliveira, Anderson Faustino da Silva:

Towards an Efficient Prolog System by Code Introspection. - Kazuya Haraguchi:

An Efficient Local Search for Partial Latin Square Extension Problem. - Antonis G. Gotsis, Stelios Stefanatos, Angeliki Alexiou:

Spatial Coordination Strategies in Future Ultra-Dense Wireless Networks. - Aleksandar Haber, Michel Verhaegen:

Sparse approximate inverses of Gramians and impulse response matrices of large-scale interconnected systems. - Rahul Tejwani:

Sentiment Analysis: A Survey. - Ilias Tachmazidis, Grigoris Antoniou, Wolfgang Faber:

Efficient Computation of the Well-Founded Semantics over Big Data. - (Withdrawn) Decoding and Computing Algorithms for Linear Superposition LDPC Coded Systems.

- Yuyi Wang, Jan Ramon, Zheng-Chu Guo:

Learning from networked examples. - Bocong Chen, San Ling, Guanghui Zhang:

Self-dual cyclic codes over finite chain rings. - Hassan Ghozlan, Gerhard Kramer:

Phase Modulation for Discrete-time Wiener Phase Noise Channels with Oversampling at High SNR. - Wenbin Zhang, Steven Skiena:

News-Based Group Modeling and Forecasting. - Paul L. Borrill, Mark Burgess, Todd Craw, Mike Dvorkin:

A Promise Theory Perspective on Data Networks. - Xavier Lacoste, Mathieu Faverge, George Bosilca, Pierre Ramet, Samuel Thibault:

Taking advantage of hybrid systems for sparse direct solvers via task-based runtimes. - K. Jyothi, C. J. Prabhakar:

Multi Modal Face Recognition Using Block Based Curvelet Features. - Radhakrishnan Delhibabu:

An Abductive Framework for Horn Knowledge Base Dynamics. - Ronald Ortner, Odalric-Ambrym Maillard, Daniil Ryabko:

Selecting Near-Optimal Approximate State Representations in Reinforcement Learning. - Ji Zhao, Deyu Meng:

FastMMD: Ensemble of Circular Discrepancy for Efficient Two-Sample Test. - Tanmoy Sarkar, Sugata Sanyal:

Reversible and Irreversible Data Hiding Technique. - Manish B. Dave, Mitesh B. Nakrani:

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques. - Sergio Castro, Kim Mens, Paulo Moura

:
Customisable Handling of Java References in Prolog Programs. - Sabina Sisovic, Sanda Martincic-Ipsic, Ana Mestrovic:

Comparison of the language networks from literature and blogs. - Paolo Zuliani:

Statistical Model Checking for Biological Applications. - Nafay Hifzur Rehman, Neelam Verma:

Application of Modified Multi Model Predictive Control Algorithm to Fluid Catalytic Cracking Unit. - Elisa Gorla, Maike Massierer:

An optimal representation for the trace zero subgroup. - Omer H. Abdelrahman, Erol Gelenbe:

Signalling Storms in 3G Mobile Networks. - Elisa Gorla, Alberto Ravagnani:

Subspace codes from Ferrers diagrams. - Myrto Arapinis, Stéphanie Delaune, Steve Kremer

:
Dynamic Tags for Security Protocols. - Erol Gelenbe, Omer H. Abdelrahman:

Search in the Universe of Big Networks and Data. - Burak Çakmak, Ole Winther, Bernard H. Fleury:

S-AMP: Approximate Message Passing for General Matrix Ensembles. - Xiongbin Rao, Vincent K. N. Lau:

Distributed Compressive CSIT Estimation and Feedback for FDD Multi-user Massive MIMO Systems. - Theofrastos Mantadelis, Ricardo Rocha, Paulo Moura:

Tabling, Rational Terms, and Coinduction Finally Together! - Amira Aloulou, Olfa Boubaker:

A Relevant Reduction Method for Dynamic Modeling of a Seven-linked Humanoid Robot in the Three-dimensional Space. - Jun Wang, Ke Sun, Fei Sha, Stéphane Marchand-Maillet, Alexandros Kalousis:

Two-Stage Metric Learning. - Aya Saad, Thom W. Frühwirth, Carmen Gervet:

The P-Box CDF-Intervals: A Reliable Constraint Reasoning with Quantifiable Information. - Quentin Gemine, Damien Ernst, Bertrand Cornélusse:

Active network management for electrical distribution systems: problem formulation and benchmark. - Sanket S. Kalamkar, Adrish Banerjee:

On the Effect of Primary User Traffic on Secondary Throughput and Outage Probability Under Rayleigh Flat Fading Channel. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:

Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal. - Ahmed El Shafie, Tamer Khattab:

On Orthogonal Band Allocation for Multi-User Mutli-Band Cognitive Radio Networks. - Ahmed El Shafie, Ahmed K. Sultan, Tamer Khattab:

Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User. - Alessio Meneghetti, Massimiliano Sala, Alessandro Tomasi:

A weight-distribution bound for entropy extractors using linear binary codes. - Xu Chen, Jianwei Huang:

Imitation-based Social Spectrum Sharing. - José R. Correa, Tobias Harks, Vincent J. C. Kreuzen, Jannik Matuschke:

Fare Evasion in Transit Networks. - Akshay Kumar, Ravi Tandon, T. Charles Clancy:

On the Latency of Erasure-Coded Cloud Storage Systems. - Ernst D. Berg:

Introduction to Dynamic Unary Encoding. - Georg Gottlob, Giorgio Orsi, Andreas Pieris:

Query Rewriting and Optimization for Ontological Databases. - Miguel Areias

, Ricardo Rocha
:
A Simple and Efficient Lock-Free Hash Trie Design for Concurrent Tabling. - Taolue Chen, Stefan Kiefer:

On the Total Variation Distance of Labelled Markov Chains. - Scott A. Hale, Taha Yasseri, Josh Cowls, Eric T. Meyer, Ralph Schroeder, Helen Z. Margetts:

Mapping the UK Webspace: Fifteen Years of British Universities on the Web. - Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik:

Secure Fragmentation for Content-Centric Networks. - Georgios Papadopoulos, Hanna Kurniawati, Nicholas M. Patrikalakis:

Analysis of Asymptotically Optimal Sampling-based Motion Planning Algorithms for Lipschitz Continuous Dynamical Systems. - Dimitri Kartsaklis, Mehrnoosh Sadrzadeh

:
A Study of Entanglement in a Categorical Framework of Natural Language. 249-261 - Chien-Ju Ho, Aleksandrs Slivkins, Jennifer Wortman Vaughan:

Adaptive Contract Design for Crowdsourcing Markets: Bandit Algorithms for Repeated Principal-Agent Problems. - Ahmed Hamdi Sakr, Ekram Hossain:

Location-Aware Cross-Tier Coordinated Multipoint Transmission in Two-Tier Cellular Networks. - Bruno Scherrer:

Approximate Policy Iteration Schemes: A Comparison. - Kartik Talamadupula, David E. Smith, Subbarao Kambhampati:

The Metrics Matter! On the Incompatibility of Different Flavors of Replanning. - Simone Bova, Robert Ganian, Stefan Szeider:

Model Checking Existential Logic on Partially Ordered Sets. - Klaus Reinhardt, Abuzer Yakaryilmaz:

The minimum amount of useful space: New results and new directions. - Swanand Kadhe, Alex Sprintson:

Weakly Secure Regenerating Codes for Distributed Storage. - Sushant Chaudhary:

Load Frequency Control For Distributed Grid Power System Single Area & Multi-area System. - Vahid Lari, Alexandru Tanase, Frank Hannig, Jürgen Teich:

Massively Parallel Processor Architectures for Resource-aware Computing. - Johny Paul, Walter Stechele, Manfred Kröhnert, Tamim Asfour:

Resource-Aware Programming for Robotic Vision. - Elisabeth Glocker, Qingqing Chen, Asheque M. Zaidi, Ulf Schlichtmann, Doris Schmitt-Landsiedel:

Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture. - Oliver Mattes, Wolfgang Karl:

Evaluating the Self-Optimization Process of the Adaptive Memory Management Architecture Self-aware Memory. - Manfred Kröhnert, Nikolaus Vahrenkamp, Johny Paul, Walter Stechele, Tamim Asfour:

Resource Prediction for Humanoid Robots. - Mario Kicherer, Wolfgang Karl:

Heterogeneity-aware Fault Tolerance using a Self-Organizing Runtime System. - Björn Döbel, Robert Muschner, Hermann Härtig:

Resource-Aware Replication on Heterogeneous Multicores: Challenges and Opportunities. - Hananeh Aliee, Liang Chen, Mojtaba Ebrahimi, Michael Glaß, Faramarz Khosravi, Mehdi Baradaran Tahoori:

Towards Cross-layer Reliability Analysis of Transient and Permanent Faults. - Christoph W. Keßler, Usman Dastgeer, Lu Li:

Optimized Composition: Generating Efficient Code for Heterogeneous Systems from Multi-Variant Components, Skeletons and Containers. - Andi Drebes, Karine Heydemann, Antoniu Pop, Albert Cohen, Nathalie Drach:

Automatic Detection of Performance Anomalies in Task-Parallel Programs. - Aurang Zaib, Prashanth Raju, Thomas Wild, Andreas Herkersdorf:

A Layered Modeling and Simulation Approach to investigate Resource-aware Computing in MPSoCs. - Thomas Karcher, Christopher Guckes, Walter F. Tichy:

Autotuning and Self-Adaptability in Concurrency Libraries. - Hadi Daneshmand, Manuel Gomez-Rodriguez, Le Song, Bernhard Schölkopf:

Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm. - Jiang Wang, Xiaohan Nie, Yin Xia, Ying Wu, Song-Chun Zhu:

Cross-view Action Modeling, Learning and Recognition. - H. Lydia Deng, John A. Scales:

Characterizing the Topography of Multi-dimensional Energy Landscapes. - Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel E. Lozano, Anthony C. K. Soong, Jianzhong (Charlie) Zhang:

What Will 5G Be? - Luca Venturino, Alessio Zappone, Chiara Risi, Stefano Buzzi:

Energy-Efficient Scheduling and Power Allocation in Downlink OFDMA Networks with Base Station Coordination. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:

Multicell Coordinated Beamforming with Rate Outage Constraint-Part I: Complexity Analysis. - Wei-Chiang Li, Tsung-Hui Chang, Chong-Yung Chi:

Multicell Coordinated Beamforming with Rate Outage Constraint-Part II: Efficient Approximation Algorithms. - Alessio Venticinque, Nicola Mazzocca, Salvatore Venticinque, Massimo Ficco:

Semantic Support for Log Analysis of Safety-Critical Embedded Systems. - (Withdrawn) Entropies from Markov Models as Complexity Measures of Embedded Attractors.

- Roberto Baldoni, Mario Caruso, Adriano Cerocchi, Claudio Ciccotelli, Luca Montanari, Luca Nicoletti:

Correlating power consumption and network traffic for improving data centers resiliency. - Alessia Garofalo, Cesario Di Sarno, Ilaria Matteucci, Marco Vallini, Valerio Formicola:

Closing the loop of SIEM analysis to Secure Critical Infrastructures. - Alexander B. Romanovsky, Marc-Olivier Killijian:

The Tenth European Dependable Computer Conference. - Maria Spichkova:

Compositional properties of crypto-based components. - Maria Spichkova:

Formalisation and Analysis of Component Dependencies. - Zeeshan Bhatti, Ahmad Waqas, Imdad Ali Ismaili, Dil Nawaz Hakro, Waseem Javaid Soomro:

Phonetic based SoundEx & ShapeEx algorithm for Sindhi Spell Checker System. - Pinar Sen, Ali Özgür Yilmaz:

A Low-Complexity Graph-Based LMMSE Receiver for MIMO ISI Channels with M-QAM Modulation. - Pierre Ganty, Radu Iosif:

Generating Bounded Languages Using Bounded Control Sets. - Raphael Poss:

Haskell for OCaml programmers. - Raphael Poss:

Categories from scratch. - Neli Blagus, Gregor Weiss, Lovro Subelj:

Sampling node group structure of social and information networks. - Olfa Boubaker:

The inverted Pendulum: A fundamental Benchmark in Control Theory and Robotics. - (Withdrawn) A Cognitive Model for Humanoid Robot Navigation and Mapping using Alderbaran NAO.

- Boris Konev

, Alexei Lisitsa:
Computer-Aided Proof of Erdos Discrepancy Properties. - Joachim Breitner:

The Correctness of Launchbury's Natural Semantics for Lazy Evaluation. - Andrea Monacchi, Dominik Egarter, Wilfried Elmenreich, Salvatore D'Alessandro, Andrea M. Tonello:

GREEND: An Energy Consumption Dataset of Households in Italy and Austria. - Yosra Arous, Olfa Boubaker:

Gait trajectory generation for a five link bipedal robot based on a reduced dynamical model. - Bichen Shi, Georgiana Ifrim, Neil Hurley:

Be In The Know: Connecting News Articles to Relevant Twitter Conversations. - Jean-Marc Kelif, Olivier Simon:

Impact of Directional Receiving Antennas on Wireless Networks. - Leila Pishdad, Fabrice Labeau:

A New Reduction Scheme for Gaussian Sum Filters. - Pokkuluri Kiran Sree, Inampudi Ramesh Babu:

Clonal-Based Cellular Automata in Bioinformatics. - Behnam Neyshabur, Yury Makarychev, Nathan Srebro:

Clustering, Hamming Embedding, Generalized LSH and the Max Norm. - Jian Zhang, Debin Zhao, Ruiqin Xiong, Siwei Ma, Wen Gao:

Image Restoration Using Joint Statistical Modeling in Space-Transform Domain. - Yong Deng:

D numbers theory: a generalization of Dempster-Shafer evidence theory. - Shangping Wang, Ru Zhao:

Lattice-Based Ring Signature Scheme under the Random Oracle Model. - Yuanming Shi, Jun Zhang, Khaled Ben Letaief:

Scalable Coordinated Beamforming for Dense Wireless Cooperative Networks. - Majid Gerami, Ming Xiao, Jun Li, Carlo Fischione, Zihuai Lin:

Repair for Distributed Storage Systems in Packet Erasure Networks. - Kaeser Md. Sabrin, Md. Haider Ali:

An Intelligent Pixel Replication Technique by Binary Decomposition for Digital Image Zooming. - Hasnae Rahimi, Hanan El Bakkali:

A New Trust Reputation System for E-Commerce Applications. - Parvathavarthini S., Shanthakumari R:

An Adaptive Watermarking Process in Hadamard Transform. - Jeremy Kun, Rajmonda Caceres, Kevin Carter:

Locally Boosted Graph Aggregation for Community Detection. - Elena Bellodi, Evelina Lamma, Fabrizio Riguzzi, Vítor Santos Costa, Riccardo Zese:

Lifted Variable Elimination for Probabilistic Logic Programming. - Éric Badouel, Loïc Hélouët, Georges Edouard Kouamou, Christophe Morvan:

A Grammatical Approach to Data-centric Case Management in a Distributed Collaborative Environment. - Manel Tagorti, Bruno Scherrer:

Rate of Convergence and Error Bounds for LSTD(λ). - S. Karimi, K. B. Nakshatrala:

A monolithic multi-time-step computational framework for advective-diffusive-reactive transient systems with disparate scales. - Chakir Tajani, Jaafar Abouchabaka:

An Alternating KMF Algorithm to Solve the Cauchy Problem for Laplaces Equation. - David A. Kosower, Juan J. Lopez-Villarejo:

Flowgen: Flowchart-Based Documentation for C++ Codes. - Eric Gribkoff, Guy Van den Broeck, Dan Suciu:

Understanding the Complexity of Lifted Inference and Asymmetric Weighted Model Counting. - Emmanuel Abbe, Afonso S. Bandeira, Georgina Hall:

Exact Recovery in the Stochastic Block Model. - Nicholas Kersting:

Fast and Fuzzy Private Set Intersection. - Tim Althoff, Cristian Danescu-Niculescu-Mizil, Dan Jurafsky:

How to Ask for a Favor: A Case Study on the Success of Altruistic Requests. - Samuel D. Johnson, Tsai-Ching Lu:

Algorithm Instance Games. - Claudio Maruccio, Laura De Lorenzis, Luana Persano, Dario Pisignano:

Computational homogenization of fibrous piezoelectric materials. - Beniamino Accattoli, Ugo Dal Lago:

Beta Reduction is Invariant, Indeed (Long Version). - Omar Besbes, Yonatan Gur, Assaf Zeevi:

Optimal Exploration-Exploitation in a Multi-Armed-Bandit Problem with Non-stationary Rewards. - James Neufeld, András György, Dale Schuurmans, Csaba Szepesvári:

Adaptive Monte Carlo via Bandit Allocation. - Aviad Rubinstein:

Inapproximability of Nash Equilibrium. - Niall Douglas:

Large Code Base Change Ripple Management in C++: My thoughts on how a new Boost C++ Library could help. - M. Ehsan Shafiee, Emily M. Zechman:

An Agent-based Modeling Framework for Sociotechnical Simulation of Water Distribution Contamination Events. - Jian Gao:

Linear Codes over Z9+uZ9 MacWilliams Identity, Self-Dual Codes, Quadratic Residue Codes and Constacyclic Codes. - Jian Zhang, Debin Zhao, Wen Gao:

Group-based Sparse Representation for Image Restoration. - Feng Lu, Ziqiang Chen:

Newton-Type Iterative Solver for Multiple View $L2$ Triangulation. - Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa:

Which one is better: presentation-based or content-based math search? - Mingrui Yang, Frank de Hoog:

New Coherence and RIP Analysis for Weak Orthogonal Matching Pursuit. - Cengis Hasan, Eitan Altman, Jean-Marie Gorce:

On the Nash Stability in the Hedonic Coalition Formation Games. - Rehan Abdul Aziz, Geoffrey Chu, Peter James Stuckey:

Grounding Bound Founded Answer Set Programs. - Yi Bi, Jia-Huai You, Zhiyong Feng:

A Well-Founded Semantics for FOL-Programs. - Rehan Abdul Aziz:

Bound Founded Answer Set Programming. - Lurong Jiang, Xinyu Jin, Yongxiang Xia, Bo Ouyang, Duanpo Wu, Xi Chen:

A Scale-Free Topology Construction Model for Wireless Sensor Networks. - Anthony Hunter, Matthias Thimm:

Probabilistic Argumentation with Epistemic Extensions and Incomplete Information. - Mboni Kibelloh, Yukun Bao:

Perceptions of International Female Students Towards E-learning in Resolving High Education and Family Role Strain. - Rafael Lahoz-Beltra:

The "crisis of noosphere" as a limiting factor to achieve the point of technological singularity. - Mboni Kibelloh, Yukun Bao:

Can Online MBA Programs Allow Professional Working Mothers to Balance Work, Family, and Career Progression? A Case Study in China. - Samaneh Khoshrou, Jaime S. Cardoso

, Luís Filipe Teixeira:
Active Mining of Parallel Video Streams. - Sana Stojanovic, Julien Narboux, Marc Bezem, Predrag Janicic:

A Vernacular for Coherent Logic. - Gregory J. Duck, Rémy Haemmerlé, Martin Sulzmann:

On Termination, Confluence and Consistent CHR-based Type Inference. - Shangping Wang, Fang Feng:

Large Universe Attribute-Based Encryption Scheme from Lattices. - Nir Ailon, Thorsten Joachims, Zohar Shay Karnin:

Reducing Dueling Bandits to Cardinal Bandits. - Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim:

Efficient classification using parallel and scalable compressed model and Its application on intrusion detection. - Aftab Ahmed Chandio, Zhibin Yu, Feroz Shah Syed, Korejo Imtiaz Ali:

A Case Study on Job Scheduling Policy for Workload Characterization and Power Efficiency. - Marthe Bonamy, Benjamin Lévêque, Alexandre Pinlou:

Planar graphs with $Δ\geq 7$ and no triangle adjacent to a C4 are minimally edge and total choosable. - Moa Johansson, Dan Rosén, Nicholas Smallbone, Koen Claessen:

Hipster: Integrating Theory Exploration in a Proof Assistant. - Ugo Dal Lago, Claudia Faggian, Ichiro Hasuo, Akira Yoshimizu:

The Geometry of Synchronization (Long Version). - Ziaeddin Beheshtifard, Mohammad Reza Meybodi:

Online Channel Assignment in Multi-Radio Wireless Mesh Networks Using Learning Automata. - Cezary Kaliszyk, Josef Urban, Jirí Vyskocil, Herman Geuvers:

Developing Corpus-based Translation Methods between Informal and Formal Mathematics: Project Description. - Gang Mei:

A Straightforward Preprocessing Approach for Accelerating Convex Hull Computations on the GPU. - Fabián Riquelme:

Satisfaction in societies with opinion leaders and mediators: properties and an axiomatization. - Matthew England:

Formulating problems for real algebraic geometry. - Salvatore Cuomo, Raffaele Farina, Ardelio Galletti, Livia Marcellino:

An error estimate of Gaussian Recursive Filter in 3Dvar problem. - Ejder Bastug, Mehdi Bennis, Mérouane Debbah:

Cache-enabled Small Cell Networks: Modeling and Tradeoffs. - Zhizheng Zhang, Kaikai Zhao:

ESmodels: An Epistemic Specification Solver. - Petr Baudis:

COCOpf: An Algorithm Portfolio Framework. - Andrej Gajduk, Zoran Utkovski, Lasko Basnarkov, Ljupco Kocarev:

Energy-efficiency in Decentralized Wireless Networks: A Game-theoretic Approach inspired by Evolutionary Biology. - Petr Baudis:

Current Concepts in Version Control Systems. - Samah A. M. Ghanem, Munnujahan Ara:

Secure Data Transmission in Cooperative Modes: Relay and MAC. - Yoon Kim, Yi-I Chiu, Kentaro Hanaki, Darshan Hegde, Slav Petrov:

Temporal Analysis of Language through Neural Language Models. - Yoon Kim, Owen Zhang:

Credibility Adjusted Term Frequency: A Supervised Term Weighting Scheme for Sentiment Analysis and Text Classification. - Ken Chatfield, Karen Simonyan, Andrea Vedaldi, Andrew Zisserman:

Return of the Devil in the Details: Delving Deep into Convolutional Nets. - Aline Parreau, Michel Rigo, Eric Rowland, Élise Vandomme:

A new approach to the $2$-regularity of the l-abelian complexity of 2-automatic sequences. - Tamal K. Dey, Fengtao Fan, Yusu Wang:

Dimension Detection with Local Homology. - Fionn Murtagh, Adam Ganz:

Pattern Recognition in Narrative: Analysis of Narratives of Emotion. - Mario Alviano, Carmine Dodaro, Francesco Ricca:

Anytime Computation of Cautious Consequences in Answer Set Programming. - Terrance Swift:

Incremental Tabling in Support of Knowledge Representation and Reasoning. - Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Andreea Picu:

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization. - Flávio Cruz, Ricardo Rocha, Seth Copen Goldstein, Frank Pfenning:

A Linear Logic Programming Language for Concurrent Programming over Graph Structures. - Iaakov Exman, Gilad Amar, Ran Shaltiel:

The Interestingness Tool for Search in the Web. - Stefano Gogioso

:
Aspects of Statistical Physics in Computational Complexity. - Daniel Gall, Thom W. Frühwirth:

Exchanging Conflict Resolution in an Adaptable Implementation of ACT-R. - Marina I. Maslennikova:

Complexity of checking whether two automata are synchronized by the same language. - Vasiliy Usatyuk:

Application of lattice reduction block Korkin-Zolotarev method to MIMO-decoding. - Kyle Marple, Gopal Gupta:

Dynamic Consistency Checking in Goal-Directed Answer Set Programming. - Christian Antic:

On cascade products of answer set programs. - Nicholas Generous, Geoffrey Fairchild, Alina Deshpande, Sara Y. Del Valle, Reid Priedhorsky:

Detecting epidemics using Wikipedia article views: A demonstration of feasibility with language as location proxy. - Anh Le, Lorenzo Keller, Hulya Seferoglu, Blerim Cici, Christina Fragouli, Athina Markopoulou:

MicroCast: Cooperative Video Streaming using Cellular and D2D Connections. - Thomas Gransden, Neil Walkinshaw

, Rajeev Raman:
Mining State-Based Models from Proof Corpora. - Yury Polyanskiy, Yihong Wu:

Dissipation of information in channels with input constraints. - Kian Win Ong, Yannis Papakonstantinou, Romain Vernoux:

The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases. - Michael Gelfond, Yuanlin Zhang:

Vicious Circle Principle and Logic Programs with Aggregates. - Marco Comini, Laura Titolo, Alicia Villanueva:

Abstract Diagnosis for tccp using a Linear Temporal Logic. - Martin Gebser, Roland Kaminski, Benjamin Kaufmann, Torsten Schaub:

Clingo = ASP + Control: Preliminary Report. - Gauri Joshi, Yuval Kochman, Gregory W. Wornell:

Throughput-Smoothness Trade-offs in Multicasting of an Ordered Packet Stream. - Francesco Calimeri, Martin Gebser, Marco Maratea, Francesco Ricca:

The Design of the Fifth Answer Set Programming Competition. - Luís Moniz Pereira, Emmanuelle-Anna Dietz, Steffen Hölldobler:

Contextual Abductive Reasoning with Side-Effects. - Aftab Ahmed Chandio, Dingju Zhu, Ali Hassan Sodhro:

Integration of Inter-Connectivity of Information System (i3) using Web Services. - YuLong Zou, Jia Zhu, Xianbin Wang, Victor C. M. Leung:

Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques. - Xi Qiu, Christopher Stewart:

Topic words analysis based on LDA model. - Sweta Rai:

Student Dropout Risk Assessment in Undergraduate Course at Residential University. - Priyanka Saini:

Building a Classification Model for Enrollment In Higher Educational Courses using Data Mining Techniques. - Erik D. Demaine, Nathan Pinsker, Jon Schneider:

Fast Dynamic Pointer Following via Link-Cut Trees. - Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle X. Zhou, Jeffrey Nichols:

Who Will Retweet This? Automatically Identifying and Engaging Strangers on Twitter to Spread Information. - Andrea Kohlhase:

Search Interfaces for Mathematicians. - Raphael Spreitzer:

PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. - Yannis Haralambous, Julie Sauvage-Vincent, John Puentes:

INAUT, a Controlled Language for the French Coast Pilot Books Instructions nautiques. - Mohammad Gholami, Mehdi Samadieh:

Quasi Cyclic LDPC Codes Based on Finite Set Systems. - Domagoj Margan, Ana Mestrovic, Sanda Martincic-Ipsic:

Complex Networks Measures for Differentiation between Normal and Shuffled Croatian Texts. - Ana Sofia Gomes, José Júlio Alferes:

Transaction Logic with (Complex) Events. - Iulia Teodora Banu-Demergian, Gheorghe Stefanescu:

On contour representation of two dimensional patterns. - Angelos Charalambidis, Zoltán Ésik, Panos Rondogiannis:

Minimum Model Semantics for Extensional Higher-order Logic Programming with Negation. - Nada Sharaf, Slim Abdennadher, Thom W. Frühwirth:

Visualization of Constraint Handling Rules. - Grzegorz Jaskiewicz:

Logic Programming as Scripting Language for Bots in Computer Games - Research Overview. - Evanthia Papadopoulou, Maksym Zavershynskyi:

The Higher-Order Voronoi Diagram of Line Segments. - Lene M. Favrholdt, Jesper W. Mikkelsen:

Online Max-Edge-Coloring of Paths and Trees. - Marco Gavanelli, Stefano Bragaglia, Michela Milano, Federico Chesani, Elisa Marengo, Paolo Cagnoli:

Multi-Criteria Optimal Planning for Energy Policies in CLP. - Heike Stephan:

Application of Methods for Syntax Analysis of Context-Free Languages to Query Evaluation of Logic Programs. - Elad Hazan, Tomer Koren, Kfir Y. Levy:

Logistic Regression: Tight Bounds for Stochastic and Online Optimization. - Xu Chen, Jianwei Huang:

Spatial Spectrum Access Game. - Palash Dey, Neeldhara Misra, Y. Narahari:

Complexity of Kernelization in the Possible Winner Problem. - Max Jaderberg, Andrea Vedaldi, Andrew Zisserman:

Speeding up Convolutional Neural Networks with Low Rank Expansions. - Fayssal Bendaoud, Marwen Abdennebi, Fedoua Didi:

Allocation des ressources radio en LTE. - John P. Gallagher, Bishoksan Kafle:

Analysis and Transformation Tools for Constrained Horn Clause Verification. - Mário Abrantes, Luís Moniz Pereira:

Properties of Stable Model Semantics Extensions. - Xiang-Gen Xia, Tianxian Zhang, Lingjiang Kong:

MIMO OFDM Radar IRCI Free Range Reconstruction with Sufficient Cyclic Prefix. - Thibault Gauthier, Cezary Kaliszyk:

Matching concepts across HOL libraries. - Rahul A. Jichkar, M. B. Chandak:

An implementation on detection of trusted service provider in mobile ad-hoc networks. - Laurent Romary, Andreas Witt:

Méthodes pour la représentation informatisée de données lexicales / Methoden der Speicherung lexikalischer Daten. - Aadhityan A.:

A Novel Method for Developing Robotics via Artificial Intelligence and Internet of Things. - Kandeepan Sithamparanathan, Karina Mabell Gomez, Laurent Reynaud, Tinku Rasheed:

Aerial-Terrestrial Communications: Terrestrial Cooperation and Energy-Efficient Transmissions to Aerial-Base Stations. - Torbjörn Lager, Jan Wielemaker:

Pengines: Web Logic Programming Made Easy. - Zoran Majkic:

Saturation of the morphisms in the database category. - Elaheh Mohammadi, Farokh Marvasti:

Optimal Distortion of Non-Uniform Sampling. - Aya Saad

:
CDF-Intervals: A Reliable Framework to Reason about Data with Uncertainty. - Anurag Bhardwaj, Vignesh Jagadeesh, Wei Di, Robinson Piramuthu, Elizabeth F. Churchill:

Enhancing Visual Fashion Recommendations with Users in the Loop. - Stefan Brass:

A Framework for Bottom-Up Simulation of SLD-Resolution. - Ben Kimmett, Alex Thomo, S. Venkatesh:

Three-Way Joins on MapReduce: An Experimental Study. - Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:

SMT-based Model Checking for Recursive Programs. - Sanaz Khan Afshar, Vincent Aravantinos, Osman Hasan, Sofiène Tahar:

Formalization of Complex Vectors in Higher-Order Logic. - Ethan K. Jackson:

A Module System for Domain-Specific Languages. - Nicolás Guarín-Zapata

, Juan Gómez, Juan Jaramillo:
Seismic Wave Scattering Through a Compressed Hybrid BEM/FEM Method. - (Withdrawn) An approximation algorithm for shortest path based on the hierarchy networks.

- Quoc V. Le, Tomás Mikolov:

Distributed Representations of Sentences and Documents. - Jianfeng Wang, Jingdong Wang, Jingkuan Song, Xin-Shun Xu, Heng Tao Shen, Shipeng Li:

Optimized Cartesian $K$-Means. - Stefano Ferretti:

On the Topology Maintenance of Dynamic P2P Overlays through Self-Healing Local Interactions. - Rukshan Alexander, Miroshan Alexander:

An ICT-Based Real-Time Surveillance System for Controlling Dengue in Sri Lanka. - Xuzhen Zhu, Hui Tian, Shi-Min Cai:

Personalized recommendation with corrected similarity. - Kristina Ban, Ivan Ivakic, Ana Mestrovic:

A preliminary study of Croatian Language Syllable Networks. - Kobi Cohen, Qing Zhao, Ananthram Swami:

Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems. - Cristian Prisacariu:

Higher Dimensional Modal Logic. - Shikhar Kumar Gupta, Foram Joshi, Dixita Limbachiya, Manish K. Gupta:

3DNA: A Tool for DNA Sculpting. - Zoran Utkovski, Andrej Gajduk, Lasko Basnarkov, Darko Bosnakovski, Ljupco Kocarev:

On Energy-efficiency in Wireless Networks: A Game-theoretic Approach to Cooperation Inspired by Evolutionary Biology. - Enrico Paolini, Cedomir Stefanovic, Gianluigi Liva, Petar Popovski:

Coded Random Access: How Coding Theory Helps to Build Random Access Protocols. - Reza Azizi:

Empirical Study of Artificial Fish Swarm Algorithm. - Liang Chang, Uli Sattler, Tianlong Gu:

Algorithm for Adapting Cases Represented in a Tractable Description Logic. - Matthias Heizmann, Jochen Hoenicke, Andreas Podelski:

Termination Analysis by Learning Terminating Programs. - Parul Sharma, Anup Girdhar:

Security concerns of ipv6-slaac and security policies to diminish the risk associated with them. - Luca Bortolussi, Rytis Paskauskas:

Mean-Field approximation and Quasi-Equilibrium reduction of Markov Population Models. - Luisa F. Polanía, Rafael E. Carrillo, Manuel Blanco-Velasco, Kenneth E. Barner:

Exploiting Prior Knowledge in Compressed Sensing Wireless ECG Systems. - Joachim Jansen:

Model revision inference for extensions of first order logic. - Andrew Fish

, Alexei Lisitsa:
Detecting unknots via equational reasoning, I: Exploration. - Qizhi Zhang, Deping Liu:

On the hopping pattern design for D2D Discovery. - Leopoldo E. Bertossi, Babak Salimi:

Unifying Causality, Diagnosis, Repairs and View-Updates in Databases. - Sourangsu Banerji:

Architectural Design of a RAM Arbiter. - Yannis Haralambous

:
Les mathématiques de la langue : l'approche formelle de Montague. - Alejandro Serrano, Pedro López-García, Manuel V. Hermenegildo:

Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types. - Mina Taheri, Nirwan Ansari:

Multi-power-level Energy Saving Management for Passive Optical Networks. - Jan A. Botha, Phil Blunsom:

Compositional Morphology for Word Representations and Language Modelling. - Pratik P. Chaphekar:

Survey of Key Distribution Schemes for Wireless Sensor Networks. - Meizhu Liu, Le Lu, Xiaojing Ye, Shipeng Yu:

Coarse-to-Fine Classification via Parametric and Nonparametric Models for Computer-Aided Diagnosis. - David B. Knoester, Heather Goldsby, Christoph Adami:

Leveraging Evolutionary Search to Discover Self-Adaptive and Self-Organizing Cellular Automata. - Akshay Gadde, Aamir Anis, Antonio Ortega:

Active Semi-Supervised Learning Using Sampling Theory for Graph Signals. - Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Danilo Montesi, Payam Siyari, Matteo Magnani:

Diffusion Processes on Multilayer Networks. - Laura M. Smith, Linhong Zhu, Kristina Lerman

, Allon G. Percus:
Partitioning Networks with Node Attributes by Compressing Information Flow. - Hemant Kumar Saini, Satpal Singh Kushwaha, C. Rama Krishna:

Compressing the Data Densely by New Geflochtener to Accelerate Web. - Fei Tan, Yongxiang Xia, Boyao Zhu:

Link Prediction in Complex Networks: A Mutual Information Perspective. - Jin Tan, Dror Baron, Liyi Dai:

Wiener Filters in Gaussian Mixture Signal Estimation with Infinity-Norm Error. - Martin Haugh, Chun Wang:

Information Relaxations and Dynamic Zero-Sum Games. - Tomoyo Sasao, Shin'ichi Konomi, Masatoshi Arikawa, Hideyuki Fujita:

Touch Survey: Comparison with Paper and Web Questionnaires. - James Hegeman, Sriram V. Pemmaraju:

Lessons from the Congested Clique Applied to MapReduce. - Vijay Bhaskar Semwal, Shiv A. Katiyar, Pavan Chakraborty, Gora Chand Nandi:

Bipedal Model Based on Human Gait Pattern Parameters Bipedal Model Based on Human Gait Pattern Parameters for Sagittal Plane Movement. - Yannis Haralambous

, Vitaly Klyuev:
Thematically Reinforced Explicit Semantic Analysis. - Yanjun Han, Huadong Meng, Yuan Shen, Xiao-Ping Zhang:

Performance Limits and Geometric Properties of Narrowband Array Localization. - Amaro Barreal, Camilla Hollanti, David A. Karpuk, Hsiao-feng Lu:

Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems. - Mohammad Abu Alsheikh, Shaowei Lin, Hwee-Pink Tan, Dusit Niyato:

Area Coverage Under Low Sensor Density. - Tao Yang, Guoqiang Mao, Wei Zhang, Xiaofeng Tao:

Transport Capacity of Distributed Wireless CSMA Networks. - Shraddha Mehta, Vaishali Kalariya:

Efficient Tracking of a Moving Object using Inter-Frame Coding. - Shraddha Mehta, Vaishali Kalariya:

Real Time Object Tracking Based on Inter-frame Coding: A Review. - Sunny Mitra, Ritwik Mitra, Martin Riedl, Chris Biemann, Animesh Mukherjee, Pawan Goyal:

That's sick dude!: Automatic identification of word sense change across different timescales. - Michiel Stock, Thomas Fober, Eyke Hüllermeier, Serghei Glinca, Gerhard Klebe, Tapio Pahikkala

, Antti Airola, Bernard De Baets, Willem Waegeman:
Identification of functionally related enzymes by learning-to-rank methods. - Chang Li, Jun Zhang, Martin Haenggi, Khaled Ben Letaief:

User-Centric Intercell Interference Nulling for Downlink Small Cell Networks. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:

An Efficient Binary Technique for Trace Simplifications of Concurrent Programs. - Mohamed A. El-Zawawy, Mohammad N. Alanazi:

Probabilistic Alias Analysis for Parallel Programming in SSA Forms. - Yi Wang, Xuemin Zhao, Zhenlong Sun, Hao Yan, Lifeng Wang, Zhihui Jin, Liubin Wang, Yang Gao, Jia Zeng, Qiang Yang, Ching Law:

Towards Topic Modeling for Big Data. - Jan Leike, Matthias Heizmann:

Geometric Series as Nontermination Arguments for Linear Lasso Programs. - Daniel Graziotin, Xiaofeng Wang, Pekka Abrahamsson:

Software developers, moods, emotions, and performance. - Tapio Pahikkala, Michiel Stock, Antti Airola, Tero Aittokallio, Bernard De Baets, Willem Waegeman:

A two-step learning approach for solving full and almost full cold start problems in dyadic prediction. - Jin Tan, Yanting Ma, Dror Baron:

Compressive Imaging via Approximate Message Passing with Image Denoising. - Domagoj Margan, Sanda Martincic-Ipsic, Ana Mestrovic:

Preliminary Report on the Structure of Croatian Linguistic Co-occurrence Networks. - Vijay Bhaskar Semwal, Gora Chand Nandi:

Study of Humanoid Push Recovery Based on Experiments. - Guido Carlo Ferrante, Jocelyn Fiorina, Maria-Gabriella Di Benedetto:

Robustness of Time Reversal vs. All-Rake Transceivers in Multiple Access Channels. - Mohammad Abu Alsheikh, Shaowei Lin, Dusit Niyato, Hwee-Pink Tan:

Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. - Justin Shi:

On The Reproducibility and Scalability of Extreme Scale Applications. - Ofer Dekel, Jian Ding, Tomer Koren, Yuval Peres:

Online Learning with Composite Loss Functions. - Holger Dell:

A simple proof that AND-compression of NP-complete problems is hard. - Olga Muñoz, Antonio Pascual-Iserte, Josep Vidal:

Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading. - Ulrike Brandt, Hermann K.-G. Walter:

Unsolvability Cores in Classification Problems. - Xiaojiang Peng, Limin Wang, Xingxing Wang, Yu Qiao:

Bag of Visual Words and Fusion Methods for Action Recognition: Comprehensive Study and Good Practice. - Tao Ye, Tao Wang, Zhipeng Lü, Jin-Kao Hao:

A Multi-parent Memetic Algorithm for the Linear Ordering Problem. - Tao Ye, Kan Zhou, Zhipeng Lü, Jin-Kao Hao:

A Memetic Algorithm for the Linear Ordering Problem with Cumulative Costs. - Siddhartha Sarma, Samar Agnihotri, Joy Kuri:

Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers. - Lakshmi Prabha S

, T. N. Janakiraman:
Polynomial-time Approximation Algorithm for finding Highly Comfortable Team in any given Social Network. - Baoxin Xiu, Changjun Fan, Meilian Liang:

On Disjoint Golomb Rulers. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:

A Distributed Algorithm for Training Nonlinear Kernel Machines. - Dhruv Mahajan, S. Sathiya Keerthi, S. Sundararajan:

A distributed block coordinate descent method for training $l_1$ regularized linear classifiers. - Michael Benedikt, Rastislav Lenhardt, James Worrell:

Model Checking Markov Chains Against Unambiguous Buchi Automata. - Neville Grech, Kyriakos Georgiou

, James Pallister, Steve Kerrison, Kerstin Eder
:
Static energy consumption analysis of LLVM IR programs. - Tong Peng, Rodrigo C. de Lamare:

Adaptive Delay-Tolerant Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems. - R. Joshua Tobin, Conor J. Houghton:

A Kernel-Based Calculation of Information on a Metric Space. - Kristjan H. Greenewald, Alfred O. Hero III:

Kronecker PCA Based Spatio-Temporal Modeling of Video for Dismount Classification. - Wei Feng, Jiaya Jia, Zhi-Qiang Liu:

ESSP: An Efficient Approach to Minimizing Dense and Nonsubmodular Energy Functions. - Chao Zhang, Hong-cen Mei, Hao Yang:

A Parallel Way to Select the Parameters of SVM Based on the Ant Optimization Algorithm. - Hu Xie, Da-Zheng Feng, Ming-Dong Yuan:

Fast Adaptive Beamforming based on kernel method under Small Sample Support. - Zhenyu Huang, Yao Sun, Dongdai Lin:

On the Efficiency of Solving Boolean Polynomial Systems with the Characteristic Set Method. - Marjan Naderinejad, Mohammad Jafar Tarokh, Alireza Poorebrahimi:

Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital. - Dalei Wu, Haiqing Wu:

Modelling Data Dispersion Degree in Automatic Robust Estimation for Multivariate Gaussian Mixture Models with an Application to Noisy Speech Processing. - Razvan Pascanu, Yann N. Dauphin, Surya Ganguli, Yoshua Bengio:

On the saddle point problem for non-convex optimization. - Bernardo Gonçalves, Fábio Porto:

$Υ$-DB: Managing scientific hypotheses as uncertain data. - Junting Chen, Vincent K. N. Lau:

Two-Tier Precoding for FDD Multi-cell Massive MIMO Time-Varying Interference Networks (Full Version). - Wanneng Shu, Wei Wang, Yunji Wang:

A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. - Xiangyun Zhou:

Training-Based SWIPT: Optimal Power Splitting at the Receiver. - Junjie Yang, Shengli Xie, Xiangyun Zhou, Rong Yu, Yan Zhang:

A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems. - Evan Chou, C. Sinan Güntürk:

Distributed noise-shaping quantization: I. Beta duals of finite frames and near-optimal quantization of random measurements. - Hongbin Chen, Fangfang Zhou, Jun Cai, Zhao Feng, He Qian:

Geometric projection-based switching policy for multiple energy harvesting transmitters. - Pavel Klavík, A. Cristiano I. Malossi, Constantine Bekas, Alessandro Curioni:

Changing Computing Paradigms Towards Power Efficiency. - Rahul Vaze, Krishna P. Jagannathan:

Finite-Horizon Optimal Transmission Policies for Energy Harvesting Sensors. - Kobi Cohen, Qing Zhao:

Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory. - Yuanshi Zheng, Tao Li, Long Wang:

Containment control of multi-agent systems with measurement noises. - Siu-Wing Cheng, Liam Mencel, Antoine Vigneron

:
A Faster Algorithm for Computing Straight Skeletons. - Ye Yu, Chen Qian:

Space Shuffle: A Scalable, Flexible, and High-Bandwidth Data Center Network. - Athanasios Naskos, Emmanouela Stachtiari, Anastasios Gounaris, Panagiotis Katsaros, Dimitrios Tsoumakos, Ioannis Konstantinou, Spyros Sioutas:

Cloud elasticity using probabilistic model checking. - Gerardo Gómez, Lorenzo Hortiguela, Quiliano Pérez, Javier Lorca, Raquel García, Mari Carmen Aguayo Torres:

YouTube QoE Evaluation Tool for Android Wireless Terminals. - Huiyue Yi:

Local signal search enhanced RMT estimator for estimating the number of signals based on random matrix theory. - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Diego Oliva:

Block matching algorithm based on Differential Evolution for motion estimation. - Jean-François Raskin, Ocan Sankur:

Multiple-Environment Markov Decision Processes. - Justin Solomon, Keenan Crane, Adrian Butscher, Chris Wojtan:

A General Framework for Bilateral and Mean Shift Filtering. - Yacine Bouzidi, Sylvain Lazard, Guillaume Moroz, Marc Pouget, Fabrice Rouillier:

Improved algorithm for computing separating linear forms for bivariate systems. - Stefan Magureanu, Richard Combes, Alexandre Proutière:

Lipschitz Bandits: Regret Lower Bounds and Optimal Algorithms. - Devavrat Shah, John N. Tsitsiklis, Yuan Zhong:

On Queue-Size Scaling for Input-Queued Switches. - Juan Luis Valerdi, Fernando Raul Rodriguez:

Una metodología para realizar Diferenciación Automática Anidada. - Paritosh Parmar:

Use of Computer Vision to Detect Tangles in Tangled Objects. - Tianrong Lin:

Model-Checking PCTL Properties of Stateless Probabilistic Pushdown Systems. - Qixing Huang, Yuxin Chen, Leonidas J. Guibas:

Scalable Semidefinite Relaxation for Maximum A Posterior Estimation. - Jun Lin, Chenrong Xiong, Zhiyuan Yan:

A Reduced Latency List Decoding Algorithm for Polar Codes. - Prateek Dewan, Ponnurangam Kumaraguru:

It Doesn't Break Just on Twitter. Characterizing Facebook content During Real World Events. - Parvez Mahmood Khan, M. M. Sufyan Beg:

Measuring Cost of Quality (CoQ) on SDLC Projects is Indispensible for Effective Software Quality Assurance. - Safa Hamdare, Varsha Nagpurkar, Jayashri Mittal:

Securing SMS Based One Time Password Technique from Man in the Middle Attack. - Aaron Moss

:
Derivatives of Parsing Expression Grammars. 180-194 - Joshua Atkins, Daniele Giacobello:

Trends and Perspectives for Signal Processing in Consumer Audio. - Meng Yue, Xiaoyu Wang:

A Revised Incremental Conductance MPPT Algorithm for Solar PV Generation Systems. - Sukhpal Singh Ghuman, Emanuele Giaquinta, Jorma Tarhio:

Alternative Algorithms for Lyndon Factorization. - Gabriel Lellouch, Amit Kumar Mishra:

Optimization of OFDM radar waveforms using genetic algorithms. - Zhen James Xiang,



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID