default search action
CoRR, May 2016
- Luckyson Khaidem, Snehanshu Saha, Sudeepa Roy Dey:
Predicting the direction of stock market prices using random forest. - Seunghyun Park, Seonwoo Min, Hyun-Soo Choi, Sungroh Yoon:
deepMiRGene: Deep Neural Network based Precursor microRNA Prediction. - Yuta Sakai, Ken-ichi Iwata:
Sharp Bounds Between Two Rényi Entropies of Distinct Positive Orders. - Imad Ahmad, Chih-Chun Wang:
Locally Repairable Regenerating Code Constructions. - Xiangjun Qian, Florent Altché, Arnaud de La Fortelle, Fabien Moutarde:
A Distributed Model Predictive Control Framework for Road-Following Formation Control of Car-like Vehicles (Extended Version). - Lisa M. Koch, Martin Rajchl, Wenjia Bai, Christian F. Baumgartner, Tong Tong, Jonathan Passerat-Palmbach, Paul Aljabar, Daniel Rueckert:
Multi-Atlas Segmentation using Partially Annotated Data: Methods and Annotation Strategies. - Philipp Grohs, Thomas Wiatowski, Helmut Bölcskei:
Deep Convolutional Neural Networks on Cartoon Functions. - Jiajun Shi, Mingyu Li, Santosh Khasanvis, Mostafizur Rahman, Csaba Andras Moritz:
Routability in 3D IC Design: Monolithic 3D vs. Skybridge 3D CMOS. - Jinwen Pan, Prateek Shah, Roberto Horowitz:
DSP Implementation of a Direct Adaptive Feedfoward Control Algorithm for Rejecting Repeatable Runout in Hard Disk Drives. - Lingxi Xie, Liang Zheng, Jingdong Wang, Alan L. Yuille, Qi Tian:
InterActive: Inter-Layer Activeness Propagation. - Lingxi Xie, Jingdong Wang, Zhen Wei, Meng Wang, Qi Tian:
DisturbLabel: Regularizing CNN on the Loss Layer. - Setareh Maghsudi, Ekram Hossain:
Distributed Cell Association for Energy Harvesting IoT Devices in Dense Small Cell Networks: A Mean-Field Multi-Armed Bandit Approach. - Prasad Raghavendra, Satish Rao, Tselil Schramm:
Strongly Refuting Random CSPs Below the Spectral Threshold. - Puneet Agarwal, Maya Ramanath, Gautam Shroff:
Relationship Queries on Large graphs using Pregel. - Rohollah Soltani, Hui Jiang:
Higher Order Recurrent Neural Networks. - Gopinath Mishra, Subhra Mazumdar, Arindam Pal:
Improved Algorithms for the Evacuation Route Planning Problem. - Piotr Bródka, Stanislaw Saganowski, Przemyslaw Kazienko:
Community Evolution. - Zezhou Cheng, Qingxiong Yang, Bin Sheng:
Deep Colorization. - Shaobo Lin, Jinshan Zeng, Xiaoqin Zhang:
Constructive neural network learning. - Ahmad Abboud, Jean-Pierre Cances, Ali H. Jaber, Vahid Meghdadi:
Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map. - Ramkumar Lakshminarayanan, Rajasekar Ramalingam:
Usage of Cloud Computing Simulators and Future Systems For Computational Research. - Zengfeng Huang, Pan Peng:
Dynamic Graph Stream Algorithms in $o(n)$ Space. - Yu Wu, Wei Wu, Zhoujun Li, Ming Zhou:
Topic Augmented Neural Network for Short Text Conversation. - Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang:
Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework. - Sajed Haque, Jeffrey O. Shallit:
Discriminators and k-Regular Sequences. - Lukasz Pater:
Application of artificial neural networks and genetic algorithms for crude fractional distillation process modeling. - Marco Giordani, Marco Mezzavilla, C. Nicolas Barati, Sundeep Rangan, Michele Zorzi:
Comparative Analysis of Initial Access Techniques in 5G mmWave Cellular Networks. - Marco Giordani, Marco Mezzavilla, Sundeep Rangan, Michele Zorzi:
Multi-Connectivity in 5G mmWave Cellular Networks. - Yuji Yoshimura, Anne Krebs, Carlo Ratti:
An analysis of visitors' length of stay through noninvasive Bluetooth monitoring in the Louvre Museum. - Songfu Cai, Vincent K. N. Lau:
MIMO Precoding for Networked Control Systems with Energy Harvesting Sensors. - Nafiseh Seyed Mazloum, Joachim Neves Rodrigues, Oskar Andersson, Anders Nejdel, Ove Edfors:
Improving practical sensitivity of energy optimized wake-up receivers: proof of concept in 65nm CMOS. - Jian-Jia Chen, Wen-Hung Huang, Cong Liu:
Automatic Parameter Derivations in k2U Framework. - Xinyu Fu, Eugene Ch'ng, Uwe Aickelin, Lanyun Zhang:
An Improved System for Sentence-level Novelty Detection in Textual Streams. - Jian-Jia Chen:
A Note on the Exact Schedulability Analysis for Segmented Self-Suspending Systems. - Xinyu Lin, Ce Zhu, Qian Zhang, Yipeng Liu:
3D Keypoint Detection Based on Deep Neural Network with Sparse Autoencoder. - Moshe Babaioff, Liad Blumrosen, Noam Nisan:
Networks of Complements. - Jacek Cichon, Rafal Kapelko, Dominik Markiewicz:
On Leader Green Election. - Heng Guo, Mark Jerrum:
Random cluster dynamics for the Ising model is rapidly mixing. - Yingxi Liu, Ahmed H. Tewfik:
Primary Traffic Characterization and Secondary Transmissions. - Dinesh Jayaraman, Kristen Grauman:
Look-ahead before you leap: end-to-end active recognition by forecasting the effect of motion. - (Withdrawn) Approximating Nash Equilibrium Via Multilinear Minimax.
- Michael C. Koval, David Hsu, Nancy S. Pollard, Siddhartha S. Srinivasa:
Configuration Lattices for Planar Contact Manipulation Under Uncertainty. - Xue Yang, Fei Han, Hua Wang, Hao Zhang:
Enforcing Template Representability and Temporal Consistency for Adaptive Sparse Tracking. - Pranav Sakulkar, Bhaskar Krishnamachari:
Stochastic Contextual Bandits with Known Reward Functions. - Alexander C. Nwala, Michael L. Nelson:
A Supervised Learning Algorithm for Binary Domain Classification of Web Queries using SERPs. - Przemyslaw Daca, Thomas A. Henzinger, Jan Kretínský, Tatjana Petrov:
Linear Distances between Markov Chains. - (Withdrawn) Pixel matrices: An elementary technique for solving nonlinear systems.
- Hang Rao, Xiaojing Shen, Yunmin Zhu, Jianxin Pan:
Distributed Detection Fusion via Monte Carlo Importance Sampling. - Fan Xu, Meixia Tao, Kangqi Liu:
Fundamental Tradeoff between Storage and Latency in Cache-Aided Wireless Interference Networks. - Yonathan Murin, Yonatan Kaspi, Ron Dabora, Deniz Gündüz:
Energy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback. - Abhishek K. Gupta, Ahmed Alkhateeb, Jeffrey G. Andrews, Robert W. Heath Jr.:
Gains of Restricted Secondary Licensing in Millimeter Wave Cellular Systems. - Kalpant Pathak, Adrish Banerjee:
On Optimal Offline Time Sharing Policy for Energy Harvesting Underlay Cognitive Radio. - Boris Ryabko:
Information-Theoretical Analysis of Two Shannon's Ciphers. - Ricardo Pio Monti, Romy Lorenz, Robert Leech, Christoforos Anagnostopoulos, Giovanni Montana:
Text-mining the NeuroSynth corpus using Deep Boltzmann Machines. - Basem G. El-Barashy:
Common-Description Learning: A Framework for Learning Algorithms and Generating Subproblems from Few Examples. - Andreas Maurer:
A vector-contraction inequality for Rademacher complexities. - Peter D. Grünwald, Nishant A. Mehta:
Fast Rates with Unbounded Losses. - Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund:
Uncertain Wiretap Channels and Secure Estimation. - Hans-Christian Ruiz, H. J. Kappen:
Particle Smoothing for Hidden Diffusion Processes: Adaptive Path Integral Smoother. - Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub:
Differentially Private Bayesian Programming. - Heba Abdelnasser, Moustafa Youssef, Khaled A. Harras:
MagBoard: Magnetic-based Ubiquitous Homomorphic Off-the-shelf Keyboard. - Song Bai, Xiang Bai, Longin Jan Latecki, Qi Tian:
Multidimensional Scaling on Multiple Input Distance Matrices. - (Withdrawn) Detecting Burnscar from Hyperspectral Imagery via Sparse Representation with Low-Rank Interference.
- Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley A. Malin:
CheapSMC: A Framework to Minimize SMC Cost in Cloud. - Dominik Neumann, Tommaso Mansi, Lucian Mihai Itu, Bogdan Georgescu, Elham Kayvanpour, Farbod Sedaghat-Hamedani, Ali Amr, Jan Haas, Hugo A. Katus, Benjamin Meder, Stefan Steidl, Joachim Hornegger, Dorin Comaniciu:
A Self-Taught Artificial Agent for Multi-Physics Computational Model Personalization. - Ahmad F. B. Alam, Abbas Soltanian, Sami Yangui, Mohammad Ali Salahuddin, Roch H. Glitho, Halima Elbiaze:
A Cloud Platform-as-a-Service for Multimedia Conferencing Service Provisioning. - Doha Hamza, Jeff S. Shamma:
BLMA: A Blind Matching Algorithm with Application to Cognitive Radio Networks. - Mark Ibrahim, Christopher M. Danforth, Peter Sheridan Dodds:
Connecting every bit of knowledge: The structure of Wikipedia's First Link Network. - Konstantin Kobylkin:
Computational complexity of guarding of proximity graphs. - Linjia Chang, Avhishek Chatterjee, Lav R. Varshney:
Performance of LDPC Decoders with Missing Connections. - Ejder Bastug, Mehdi Bennis, Marios Kountouris, Mérouane Debbah:
Edge Caching for Coverage and Capacity-aided Heterogeneous Networks. - Ni Ding, Parastoo Sadeghi, Rodney A. Kennedy:
Adaptive Modulation in Network-coded Two-way Relay Channel: A Supermodular Game Approach. - Hirokatsu Kataoka, Masaki Hayashi, Kenji Iwata, Yutaka Satoh, Yoshimitsu Aoki, Slobodan Ilic:
Dominant Codewords Selection with Topic Model for Action Recognition. - Ewout van den Berg:
Some Insights into the Geometry and Training of Neural Networks. - Maani Ghaffari Jadidi, Jaime Valls Miró, Gamini Dissanayake:
Gaussian Process Autonomous Mapping and Exploration for Range Sensing Mobile Robots. - Liang Li, Jiannan Liu, Huaqing Wan:
Parameter estimation for linear control valve with hysteresis. - Nicholas Farrow, Yang Li, Nikolaus Correll:
Morphological and Embedded Computation in a Self-contained Soft Robotic Hand. - Federico De Meo, Marco Rocchetto, Luca Viganò:
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version). - Amar Ranjan Dash, Sandipta Kumar Sahu, Sanjay Kumar Samantra:
An optimized round robin cpu scheduling algorithm with dynamic time quantum. - Pavel Svoboda, Michal Hradis, David Barina, Pavel Zemcík:
Compression Artifacts Removal Using Convolutional Neural Networks. - Lorenzo Clemente, Pawel Parys, Sylvain Salvati, Igor Walukiewicz:
The Diagonal Problem for Higher-Order Recursion Schemes is Decidable. - Ching-Chi Lin, Cheng-Yu Hsieh:
A Linear-Time Algorithm for the Weighted Paired-Domination Problem on Block Graphs. - Wataru Hino, Hiroki Kobayashi, Ichiro Hasuo, Bart Jacobs:
Healthiness from Duality. - Mattia Rebato, Federico Boccardi, Marco Mezzavilla, Sundeep Rangan, Michele Zorzi:
Hybrid Spectrum Access for mmWave Networks. - Jose Armando Oviedo, Hamid R. Sadjadpour:
A New NOMA Approach for Fair Power Allocation. - Andrea Zunino, Jacopo Cavazza, Vittorio Murino:
Revisiting Human Action Recognition: Personalization vs. Generalization. - Akshay Khatri, Sankalp Kolhe, Nupur Giri:
Dynamic Address Allocation Algorithm for Mobile Ad hoc Networks. - Stephen Melczer, Bruno Salvy:
Symbolic-Numeric Tools for Analytic Combinatorics in Several Variables. - Ming Li:
Simple2Complex: Global Optimization by Gradient Descent. - Shibsankar Das, Kalpesh Kapoor:
A Tight Lower Bound for the Weights of Maximum Weight Matching in Bipartite Graphs. - Cristina Cano, Douglas J. Leith, Andres Garcia-Saavedra, Pablo Serrano:
Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi. - Alexander Kobel, Fabrice Rouillier, Michael Sagraloff:
Computing Real Roots of Real Polynomials ... and now For Real! - Nikolai Dokuchaev:
On sampling theorem with sparse decimated samples. - Oliver Wilhelm Gnilke, Ha Thanh Nguyen Tran, Alex Karrila, Camilla Hollanti:
Well-Rounded Lattices for Reliability and Security in Rayleigh Fading SISO Channels. - Ritesh Sarkhel, Amit K. Saha, Nibaran Das:
An Enhanced Harmony Search Method for Bangla Handwritten Character Recognition Using Region Sampling. - Roland Meyer, Sebastian Muskalla:
Munchausen Iteration. - Musabbir Majeed, Fehmi Cirak:
Isogeometric analysis using manifold-based smooth basis functions. - Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. - Yue Cao, Ning Wang, George Kamel, Young-Jin Kim:
An Electric Vehicle Charging Management Scheme Based on Publish/Subscribe Communication Framework. - Marthe Bonamy, Nicolas Bousquet:
Token Sliding on Chordal Graphs. - Raja Naeem Akram, Konstantinos Markantonakis:
Challenges of Security and Trust of Mobile Devices as Digital Avionics Component. - Sihyun Jeong, Giseop Noh, Hayoung Oh, Chong-kwon Kim:
Follow Spam Detection based on Cascaded Social Information. - Bastien Pasdeloup, Vincent Gripon, Grégoire Mercier, Dominique Pastor:
Towards a characterization of the uncertainty curve for graphs. - Paulo Sérgio Silva Rodrigues, Gilson Antonio Giraldi:
Fourier Analysis and q-Gaussian Functions: Analytical and Numerical Results. - Desmond Elliott, Stella Frank, Khalil Sima'an, Lucia Specia:
Multi30K: Multilingual English-German Image Descriptions. - Per Austrin, Petteri Kaski, Mikko Koivisto, Jesper Nederlof:
Sharper Upper Bounds for Unbalanced Uniquely Decodable Code Pairs. - Oliver Woizekowski, Ron van der Meyden:
Nondeterministic Multi-Domain Noninterference via Policy Reduction. - Yuchao Dai, Hongdong Li, Laurent Kneip:
Rolling Shutter Camera Relative Pose: Generalized Epipolar Geometry. - Daniel Verenzuela, Guowang Miao:
Scalable Device-to-Device Communications For Frequency Reuse >> 1. - Geon-min Kim, Hwaran Lee, Jisu Choi, Soo-Young Lee:
Compositional Sentence Representation from Character within Large Context Text. - Lawrence Mitchell, Eike Hermann Müller:
High level implementation of geometric multigrid solvers for finite element problems: applications in atmospheric modelling. - Ryuta Arisaka, Ken Satoh:
Coalition Formability Semantics with Conflict-Eliminable Sets of Arguments. - Jörg Thalheim, Pramod Bhatotia, Christof Fetzer:
Inspector: A Data Provenance Library for Multithreaded Programs. - Waqas Bin Abbas, Michele Zorzi:
Towards an Appropriate Beamforming Scheme for Initial Cell Discovery in mmW 5G Cellular Networks. - Katalin Orosz, Illés J. Farkas, Péter Pollner:
Quantifying the changing role of past publications. - Atle Rygg, Marta Molinas, Chen Zhang, Xu Cai:
A modified sequence domain impedance definition and its equivalence to the dq-domain impedance definition for the stability analysis of AC power electronic systems. - Didem Gözüpek, Sibel Özkan, Christophe Paul, Ignasi Sau, Mordechai Shalom:
Parameterized complexity of the MINCCA problem on graphs of bounded decomposability. - Aristide Grange, Imed Kacem, Sébastien Martin:
Algorithms for the Pagination Problem, a Bin Packing with Overlapping Items. - Kun Chen, Longbo Huang:
Age-of-Information in the Presence of Error. - David Barina, Michal Kula, Pavel Zemcík:
Parallel Wavelet Schemes for Images. - Marcin Kozik:
Weaker consistency notions for all the CSPs of bounded width. - Noranart Vesdapunt, Utkarsh Sinha:
Comparison of Optimization Methods in Optical Flow Estimation. - Brian Swenson, Ceyhun Eksin, Soummya Kar, Alejandro Ribeiro:
Fictitious Play with Inertia Learns Pure Equilibria in Distributed Games with Incomplete Information. - Stefan Mitsch, Khalil Ghorbal, David Vogelbacher, André Platzer:
Formal Verification of Obstacle Avoidance and Navigation of Ground Robots. - Hemant Tyagi, Anastasios Kyrillidis, Bernd Gärtner, Andreas Krause:
Algorithms for Learning Sparse Additive Models with Interactions in High Dimensions. - Johann Schlamp, Matthias Wählisch, Thomas C. Schmidt, Georg Carle, Ernst W. Biersack:
CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP. - Feier Lian, Alexandra Duel-Hallen, Aranya Chakrabortty:
Sparsity-Constrained Games and Distributed Optimization with Applications to Wide-Area Control of Power Systems. - Bahman Kalantari:
A Necessary and Sufficient Condition for Local Maxima of Polynomial Modulus Over Unit Disc. - Sihua Shao, Abdallah Khreishah, Hany Elgala:
Pixelated VLC-backscattering for Self-charging Indoor IoT Devices. - Hua Sun, Syed Ali Jafar:
The Capacity of Robust Private Information Retrieval with Colluding Databases. - Emilio Ferrara, Wen-Qiang Wang, Onur Varol, Alessandro Flammini, Aram Galstyan:
Predicting online extremism, content adopters, and interaction reciprocity. - Jianhua Mo, Ahmed Alkhateeb, Shadi Abu-Surra, Robert W. Heath Jr.:
Hybrid Architectures with Few-Bit ADC Receivers: Achievable Rates and Energy-Rate Tradeoffs. - Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma:
Security and Privacy Aspects in MapReduce on Clouds: A Survey. - Lu Zhang, Luis Vega, Michael B. Taylor:
Power Side Channels in Security ICs: Hardware Countermeasures. - Babak Heydari, Mohsen Mosleh, Kia Dalili:
From Modular to Distributed Open Architectures: A Unified Decision Framework. - Maria I. Mera Collantes, Mohamed El Massad, Siddharth Garg:
Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks. - Mayank Kejriwal:
Disjunctive Normal Form Schemes for Heterogeneous Attributed Graphs. - David Ward, Nuno C. Martins:
Optimal Remote Estimation Over Use-Dependent Packet-Drop Channels - Extended Version. - Kaniska Mohanty, Mahesh K. Varanasi:
The Generalized Degrees of Freedom Region of the MIMO Z-Interference Channel with Delayed CSIT. - Christian Schindelhauer, Andreas Jakoby, Sven Köhler:
Cyclone Codes.