callback( { "result":{ "query":":facetid:toc:\"db/journals/corr/corr0503.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"67.70" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"106", "@dc":"106", "@oc":"106", "@id":"43431175", "text":":facetid:toc:db/journals/corr/corr0503.bht" } }, "hits":{ "@total":"106", "@computed":"106", "@sent":"106", "@first":"0", "hit":[{ "@score":"1", "@id":"5960055", "info":{"authors":{"author":{"@pid":"32/363","text":"Lars Eirik Danielsen"}},"title":"On Self-Dual Quantum Codes, Graphs, and Boolean Functions.","venue":"CoRR","volume":"abs/quant-ph/0503236","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Danielsen05","ee":"http://arxiv.org/abs/quant-ph/0503236","url":"https://dblp.org/rec/journals/corr/Danielsen05"}, "url":"URL#5960055" }, { "@score":"1", "@id":"5960061", "info":{"authors":{"author":{"@pid":"47/717","text":"Subhash C. Kak"}},"title":"A Three-Stage Quantum Cryptography Protocol.","venue":"CoRR","volume":"abs/quant-ph/0503027","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kak05","ee":"http://arxiv.org/abs/quant-ph/0503027","url":"https://dblp.org/rec/journals/corr/Kak05"}, "url":"URL#5960061" }, { "@score":"1", "@id":"5960062", "info":{"authors":{"author":{"@pid":"08/5596","text":"Ewa Krot"}},"title":"Characterization of the Fibonacci Cobweb Poset as oDAG.","venue":"CoRR","volume":"abs/math/0503295","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krot05","ee":"http://arxiv.org/abs/math/0503295","url":"https://dblp.org/rec/journals/corr/Krot05"}, "url":"URL#5960062" }, { "@score":"1", "@id":"5960063", "info":{"authors":{"author":{"@pid":"08/5596","text":"Ewa Krot"}},"title":"An Introduction to Finite Fibonomial Calculus.","venue":"CoRR","volume":"abs/math/0503210","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krot05a","ee":"http://arxiv.org/abs/math/0503210","url":"https://dblp.org/rec/journals/corr/Krot05a"}, "url":"URL#5960063" }, { "@score":"1", "@id":"5960064", "info":{"authors":{"author":{"@pid":"00/673","text":"A. K. Kwasniewski"}},"title":"Cobweb posets as noncommutative prefabs.","venue":"CoRR","volume":"abs/math/0503286","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kwasniewski05","ee":"http://arxiv.org/abs/math/0503286","url":"https://dblp.org/rec/journals/corr/Kwasniewski05"}, "url":"URL#5960064" }, { "@score":"1", "@id":"5960070", "info":{"authors":{"author":{"@pid":"25/757","text":"Alexander Yu. Vlasov"}},"title":"Programmable Quantum Networks with Pure States.","venue":"CoRR","volume":"abs/quant-ph/0503230","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/Vlasov05","ee":"http://arxiv.org/abs/quant-ph/0503230","url":"https://dblp.org/rec/journals/corr/Vlasov05"}, "url":"URL#5960070" }, { "@score":"1", "@id":"5960079", "info":{"authors":{"author":[{"@pid":"34/4066","text":"Dimitris Achlioptas"},{"@pid":"97/4275","text":"Aaron Clauset"},{"@pid":"63/5749-1","text":"David Kempe 0001"},{"@pid":"m/CristopherMoore","text":"Cristopher Moore"}]},"title":"On the Bias of Traceroute Sampling; or, Power-law Degree Distributions in Regular Graphs","venue":"CoRR","volume":"abs/cond-mat/0503087","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cond-mat-0503087","ee":"http://arxiv.org/abs/cond-mat/0503087","url":"https://dblp.org/rec/journals/corr/abs-cond-mat-0503087"}, "url":"URL#5960079" }, { "@score":"1", "@id":"5960080", "info":{"authors":{"author":{"@pid":"59/5156","text":"Boris D. Lubachevsky"}},"title":"How to Simulate Billiards and Similar Systems","venue":"CoRR","volume":"abs/cond-mat/0503627","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cond-mat-0503627","ee":"http://arxiv.org/abs/cond-mat/0503627","url":"https://dblp.org/rec/journals/corr/abs-cond-mat-0503627"}, "url":"URL#5960080" }, { "@score":"1", "@id":"5960291", "info":{"authors":{"author":{"@pid":"27/4742","text":"Emanuel Diamant"}},"title":"Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but actually it is not)","venue":"CoRR","volume":"abs/cs/0503001","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503001","ee":"http://arxiv.org/abs/cs/0503001","url":"https://dblp.org/rec/journals/corr/abs-cs-0503001"}, "url":"URL#5960291" }, { "@score":"1", "@id":"5960292", "info":{"authors":{"author":[{"@pid":"39/48","text":"Lester O. Lobo"},{"@pid":"59/1959","text":"James D. Arthur"}]},"title":"Local and Global Analysis: Complementary Activities for Increasing the Effectiveness of Requirements Verification and Validation","venue":"CoRR","volume":"abs/cs/0503002","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503002","ee":"http://arxiv.org/abs/cs/0503002","url":"https://dblp.org/rec/journals/corr/abs-cs-0503002"}, "url":"URL#5960292" }, { "@score":"1", "@id":"5960293", "info":{"authors":{"author":[{"@pid":"39/48","text":"Lester O. Lobo"},{"@pid":"59/1959","text":"James D. Arthur"}]},"title":"An Objectives-Driven Process for Selecting Methods to Support Requirements Engineering Activities","venue":"CoRR","volume":"abs/cs/0503003","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503003","ee":"http://arxiv.org/abs/cs/0503003","url":"https://dblp.org/rec/journals/corr/abs-cs-0503003"}, "url":"URL#5960293" }, { "@score":"1", "@id":"5960294", "info":{"authors":{"author":[{"@pid":"39/48","text":"Lester O. Lobo"},{"@pid":"59/1959","text":"James D. Arthur"}]},"title":"Effective Requirements Generation: Synchronizing Early Verification & Validation, Methods and Method Selection Criteria","venue":"CoRR","volume":"abs/cs/0503004","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503004","ee":"http://arxiv.org/abs/cs/0503004","url":"https://dblp.org/rec/journals/corr/abs-cs-0503004"}, "url":"URL#5960294" }, { "@score":"1", "@id":"5960295", "info":{"authors":{"author":[{"@pid":"33/709","text":"A. Kuyumchyan"},{"@pid":"78/5082","text":"A. Isoyan"},{"@pid":"49/1808","text":"E. Shulakov"},{"@pid":"73/384","text":"V. Aristov"},{"@pid":"07/6632","text":"M. Kondratenkov"},{"@pid":"82/758","text":"A. Snigirev"},{"@pid":"96/1016","text":"I. Snigireva"},{"@pid":"03/2528","text":"A. Souvorov"},{"@pid":"45/4984","text":"K. Tamasaku"},{"@pid":"30/2461","text":"M. Yabashi"},{"@pid":"10/4718","text":"T. Ishikawa"},{"@pid":"64/1184","text":"K. Trouni"}]},"title":"High efficiency and low absorption Fresnel compound zone plates for hard X-ray focusing","venue":"CoRR","volume":"abs/cs/0503005","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503005","ee":"http://arxiv.org/abs/cs/0503005","url":"https://dblp.org/rec/journals/corr/abs-cs-0503005"}, "url":"URL#5960295" }, { "@score":"1", "@id":"5960296", "info":{"authors":{"author":[{"@pid":"53/252","text":"Jing Cai"},{"@pid":"74/1294","text":"Cen Tjhai"},{"@pid":"13/1937","text":"Martin Tomlinson"},{"@pid":"37/2612","text":"Marcel Ambroze"},{"@pid":"18/8261","text":"Mohammed Zaki Ahmed"}]},"title":"A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods","venue":"CoRR","volume":"abs/cs/0503006","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503006","ee":"http://arxiv.org/abs/cs/0503006","url":"https://dblp.org/rec/journals/corr/abs-cs-0503006"}, "url":"URL#5960296" }, { "@score":"1", "@id":"5960297", "info":{"authors":{"author":[{"@pid":"b/JohanBollen","text":"Johan Bollen"},{"@pid":"s/HerbertVandeSompel","text":"Herbert Van de Sompel"},{"@pid":"10/6213","text":"Joan A. Smith"},{"@pid":"12/940","text":"Richard Luce"}]},"title":"Toward alternative metrics of journal impact: A comparison of download and citation data","venue":"CoRR","volume":"abs/cs/0503007","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503007","ee":"http://arxiv.org/abs/cs/0503007","url":"https://dblp.org/rec/journals/corr/abs-cs-0503007"}, "url":"URL#5960297" }, { "@score":"1", "@id":"5960298", "info":{"authors":{"author":{"@pid":"47/5572","text":"Laurent Tournier"}},"title":"Approximation of dynamical systems using S-systems theory : application to biological systems","venue":"CoRR","volume":"abs/cs/0503008","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503008","ee":"http://arxiv.org/abs/cs/0503008","url":"https://dblp.org/rec/journals/corr/abs-cs-0503008"}, "url":"URL#5960298" }, { "@score":"1", "@id":"5960299", "info":{"authors":{"author":[{"@pid":"24/1001","text":"Rodrigo S. C. Leão"},{"@pid":"b/ValmirCBarbosa","text":"Valmir Carneiro Barbosa"}]},"title":"Minimal chordal sense of direction and circulant graphs","venue":"CoRR","volume":"abs/cs/0503009","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503009","ee":"http://arxiv.org/abs/cs/0503009","url":"https://dblp.org/rec/journals/corr/abs-cs-0503009"}, "url":"URL#5960299" }, { "@score":"1", "@id":"5960300", "info":{"authors":{"author":[{"@pid":"75/5868","text":"Wolfram Krause"},{"@pid":"49/1271","text":"Jan Scholz"},{"@pid":"81/5837","text":"Martin Greiner"}]},"title":"Optimized network structure and routing metric in wireless multihop ad hoc communication","venue":"CoRR","volume":"abs/cs/0503010","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503010","ee":"http://arxiv.org/abs/cs/0503010","url":"https://dblp.org/rec/journals/corr/abs-cs-0503010"}, "url":"URL#5960300" }, { "@score":"1", "@id":"5960301", "info":{"authors":{"author":[{"@pid":"02/706","text":"Sandeep Pandey"},{"@pid":"05/6852","text":"Sourashis Roy"},{"@pid":"o/ChristopherOlston","text":"Christopher Olston"},{"@pid":"76/4977","text":"Junghoo Cho"},{"@pid":"c/SChakrabarti","text":"Soumen Chakrabarti"}]},"title":"Shuffling a Stacked Deck: The Case for Partially Randomized Ranking of Search Engine Results","venue":"CoRR","volume":"abs/cs/0503011","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503011","ee":"http://arxiv.org/abs/cs/0503011","url":"https://dblp.org/rec/journals/corr/abs-cs-0503011"}, "url":"URL#5960301" }, { "@score":"1", "@id":"5960302", "info":{"authors":{"author":[{"@pid":"g/FlorisGeerts","text":"Floris Geerts"},{"@pid":"h/SofieHaesevoets","text":"Sofie Haesevoets"},{"@pid":"k/BartKuijpers","text":"Bart Kuijpers"}]},"title":"First-order Complete and Computationally Complete Query Languages for Spatio-Temporal Databases","venue":"CoRR","volume":"abs/cs/0503012","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503012","ee":"http://arxiv.org/abs/cs/0503012","url":"https://dblp.org/rec/journals/corr/abs-cs-0503012"}, "url":"URL#5960302" }, { "@score":"1", "@id":"5960303", "info":{"authors":{"author":[{"@pid":"b/LuizAngeloBarchet","text":"Luiz Angelo Barchet-Estefanel"},{"@pid":"m/GregoryMounie","text":"Grégory Mounié"}]},"title":"Prédiction de Performances pour les Communications Collectives","venue":"CoRR","volume":"abs/cs/0503013","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503013","ee":"http://arxiv.org/abs/cs/0503013","url":"https://dblp.org/rec/journals/corr/abs-cs-0503013"}, "url":"URL#5960303" }, { "@score":"1", "@id":"5960304", "info":{"authors":{"author":{"@pid":"49/2294","text":"Christian W. Straka"}},"title":"ADF95: Tool for automatic differentiation of a FORTRAN code designed for large numbers of independent variables","venue":"CoRR","volume":"abs/cs/0503014","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503014","ee":"http://arxiv.org/abs/cs/0503014","url":"https://dblp.org/rec/journals/corr/abs-cs-0503014"}, "url":"URL#5960304" }, { "@score":"1", "@id":"5960305", "info":{"authors":{"author":[{"@pid":"d/ArievanDeursen","text":"Arie van Deursen"},{"@pid":"76/5750","text":"Marius Marin"},{"@pid":"m/LeonMoonen","text":"Leon Moonen"}]},"title":"A Systematic Aspect-Oriented Refactoring and Testing Strategy, and its Application to JHotDraw","venue":"CoRR","volume":"abs/cs/0503015","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503015","ee":"http://arxiv.org/abs/cs/0503015","url":"https://dblp.org/rec/journals/corr/abs-cs-0503015"}, "url":"URL#5960305" }, { "@score":"1", "@id":"5960306", "info":{"authors":{"author":[{"@pid":"l/XiaomingLiu5","text":"Xiaoming Liu 0005"},{"@pid":"15/1007","text":"Lyudmila Balakireva"},{"@pid":"74/762","text":"Patrick Hochstenbach"},{"@pid":"s/HerbertVandeSompel","text":"Herbert Van de Sompel"}]},"title":"File-based storage of Digital Objects and constituent datastreams: XMLtapes and Internet Archive ARC files","venue":"CoRR","volume":"abs/cs/0503016","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503016","ee":"http://arxiv.org/abs/cs/0503016","url":"https://dblp.org/rec/journals/corr/abs-cs-0503016"}, "url":"URL#5960306" }, { "@score":"1", "@id":"5960307", "info":{"authors":{"author":[{"@pid":"h/JosephYHalpern","text":"Joseph Y. Halpern"},{"@pid":"p/RPucella","text":"Riccardo Pucella"}]},"title":"Probabilistic Algorithmic Knowledge","venue":"CoRR","volume":"abs/cs/0503018","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503018","ee":"http://arxiv.org/abs/cs/0503018","url":"https://dblp.org/rec/journals/corr/abs-cs-0503018"}, "url":"URL#5960307" }, { "@score":"1", "@id":"5960308", "info":{"authors":{"author":[{"@pid":"l/AmosLapidoth","text":"Amos Lapidoth"},{"@pid":"59/2163","text":"Natalia Miliou"}]},"title":"Duality Bounds on the Cut-Off Rate with Applications to Ricean Fading","venue":"CoRR","volume":"abs/cs/0503019","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503019","ee":"http://arxiv.org/abs/cs/0503019","url":"https://dblp.org/rec/journals/corr/abs-cs-0503019"}, "url":"URL#5960308" }, { "@score":"1", "@id":"5960309", "info":{"authors":{"author":[{"@pid":"22/6006","text":"Tim Brody"},{"@pid":"h/StevanHarnad","text":"Stevan Harnad"}]},"title":"Earlier Web Usage Statistics as Predictors of Later Citation Impact","venue":"CoRR","volume":"abs/cs/0503020","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503020","ee":"http://arxiv.org/abs/cs/0503020","url":"https://dblp.org/rec/journals/corr/abs-cs-0503020"}, "url":"URL#5960309" }, { "@score":"1", "@id":"5960310", "info":{"authors":{"author":{"@pid":"h/StevanHarnad","text":"Stevan Harnad"}},"title":"Fast-Forward on the Green Road to Open Access: The Case Against Mixing Up Green and Gold","venue":"CoRR","volume":"abs/cs/0503021","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503021","ee":"http://arxiv.org/abs/cs/0503021","url":"https://dblp.org/rec/journals/corr/abs-cs-0503021"}, "url":"URL#5960310" }, { "@score":"1", "@id":"5960311", "info":{"authors":{"author":[{"@pid":"89/6178","text":"Daniel Pfeifer"},{"@pid":"l/PCLockemann","text":"Peter C. Lockemann"}]},"title":"Theory and Practice of Transactional Method Caching","venue":"CoRR","volume":"abs/cs/0503022","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503022","ee":"http://arxiv.org/abs/cs/0503022","url":"https://dblp.org/rec/journals/corr/abs-cs-0503022"}, "url":"URL#5960311" }, { "@score":"1", "@id":"5960312", "info":{"authors":{"author":[{"@pid":"90/3735","text":"Josiah Carlson"},{"@pid":"e/DEppstein","text":"David Eppstein"}]},"title":"The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems","venue":"CoRR","volume":"abs/cs/0503023","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503023","ee":"http://arxiv.org/abs/cs/0503023","url":"https://dblp.org/rec/journals/corr/abs-cs-0503023"}, "url":"URL#5960312" }, { "@score":"1", "@id":"5960313", "info":{"authors":{"author":[{"@pid":"28/2942","text":"Dan Tufis"},{"@pid":"84/4409","text":"Radu Ion"},{"@pid":"i/NancyIde","text":"Nancy Ide"}]},"title":"Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word Alignment, Word Clustering and Aligned Wordnets","venue":"CoRR","volume":"abs/cs/0503024","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503024","ee":"http://arxiv.org/abs/cs/0503024","url":"https://dblp.org/rec/journals/corr/abs-cs-0503024"}, "url":"URL#5960313" }, { "@score":"1", "@id":"5960314", "info":{"authors":{"author":[{"@pid":"86/3457-9","text":"Jia Yu 0009"},{"@pid":"b/RajkumarBuyya","text":"Rajkumar Buyya"}]},"title":"A Taxonomy of Workflow Management Systems for Grid Computing","venue":"CoRR","volume":"abs/cs/0503025","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503025","ee":"http://arxiv.org/abs/cs/0503025","url":"https://dblp.org/rec/journals/corr/abs-cs-0503025"}, "url":"URL#5960314" }, { "@score":"1", "@id":"5960315", "info":{"authors":{"author":{"@pid":"h/MarcusHutter","text":"Marcus Hutter"}},"title":"On Generalized Computable Universal Priors and their Convergence","venue":"CoRR","volume":"abs/cs/0503026","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503026","ee":"http://arxiv.org/abs/cs/0503026","url":"https://dblp.org/rec/journals/corr/abs-cs-0503026"}, "url":"URL#5960315" }, { "@score":"1", "@id":"5960316", "info":{"authors":{"author":[{"@pid":"21/6031","text":"Emin Martinian"},{"@pid":"94/5969","text":"Gregory W. Wornell"},{"@pid":"36/39-2","text":"Brian Chen 0002"}]},"title":"Authentication with Distortion Criteria","venue":"CoRR","volume":"abs/cs/0503027","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503027","ee":"http://arxiv.org/abs/cs/0503027","url":"https://dblp.org/rec/journals/corr/abs-cs-0503027"}, "url":"URL#5960316" }, { "@score":"1", "@id":"5960317", "info":{"authors":{"author":[{"@pid":"07/3249","text":"Phan Minh Dung"},{"@pid":"09/185","text":"Do Duc Hanh"},{"@pid":"33/917","text":"Phan Minh Thang"}]},"title":"Stabilization of Cooperative Information Agents in Unpredictable Environment: A Logic Programming Approach","venue":"CoRR","volume":"abs/cs/0503028","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503028","ee":"http://arxiv.org/abs/cs/0503028","url":"https://dblp.org/rec/journals/corr/abs-cs-0503028"}, "url":"URL#5960317" }, { "@score":"1", "@id":"5960318", "info":{"authors":{"author":[{"@pid":"57/1895","text":"Michael J. Kurtz"},{"@pid":"19/4167","text":"Günther Eichhorn"},{"@pid":"66/31","text":"Alberto Accomazzi"},{"@pid":"68/6122","text":"Carolyn Stern-Grant"},{"@pid":"58/610","text":"Markus Demleitner"},{"@pid":"68/1064","text":"Edwin A. Henneken"},{"@pid":"29/5959","text":"Stephen S. Murray"}]},"title":"The Effect of Use and Access on Citations","venue":"CoRR","volume":"abs/cs/0503029","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503029","ee":"http://arxiv.org/abs/cs/0503029","url":"https://dblp.org/rec/journals/corr/abs-cs-0503029"}, "url":"URL#5960318" }, { "@score":"1", "@id":"5960319", "info":{"authors":{"author":[{"@pid":"73/507","text":"Rajesh Mysore Pampapathi"},{"@pid":"m/BorisMirkin","text":"Boris G. Mirkin"},{"@pid":"l/MarkLevene","text":"Mark Levene"}]},"title":"A Suffix Tree Approach to Email Filtering","venue":"CoRR","volume":"abs/cs/0503030","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503030","ee":"http://arxiv.org/abs/cs/0503030","url":"https://dblp.org/rec/journals/corr/abs-cs-0503030"}, "url":"URL#5960319" }, { "@score":"1", "@id":"5960320", "info":{"authors":{"author":[{"@pid":"92/3684","text":"An-Swol Hu"},{"@pid":"25/3280","text":"Sergio D. Servetto"}]},"title":"On the Scalability of Cooperative Time Synchronization in Pulse-Connected Networks","venue":"CoRR","volume":"abs/cs/0503031","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503031","ee":"http://arxiv.org/abs/cs/0503031","url":"https://dblp.org/rec/journals/corr/abs-cs-0503031"}, "url":"URL#5960320" }, { "@score":"1", "@id":"5960321", "info":{"authors":{"author":[{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"},{"@pid":"b/LoretoBravo","text":"Loreto Bravo"},{"@pid":"f/EnricoFranconi","text":"Enrico Franconi"},{"@pid":"35/4309","text":"Andrei Lopatenko"}]},"title":"Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints","venue":"CoRR","volume":"abs/cs/0503032","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503032","ee":"http://arxiv.org/abs/cs/0503032","url":"https://dblp.org/rec/journals/corr/abs-cs-0503032"}, "url":"URL#5960321" }, { "@score":"1", "@id":"5960322", "info":{"authors":{"author":[{"@pid":"34/3281","text":"Stergos D. Afantenos"},{"@pid":"97/572","text":"Konstantina Liontou"},{"@pid":"74/1200","text":"Maria Salapata"},{"@pid":"79/5857","text":"Vangelis Karkaletsis"}]},"title":"An Introduction to the Summarization of Evolving Events: Linear and Non-linear Evolution","venue":"CoRR","volume":"abs/cs/0503033","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503033","ee":"http://arxiv.org/abs/cs/0503033","url":"https://dblp.org/rec/journals/corr/abs-cs-0503033"}, "url":"URL#5960322" }, { "@score":"1", "@id":"5960323", "info":{"authors":{"author":[{"@pid":"19/6010","text":"David Poulin"},{"@pid":"31/2854","text":"Hugo Touchette"}]},"title":"Comment on "Some non-conventional ideas about algorithmic complexity"","venue":"CoRR","volume":"abs/cs/0503034","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503034","ee":"http://arxiv.org/abs/cs/0503034","url":"https://dblp.org/rec/journals/corr/abs-cs-0503034"}, "url":"URL#5960323" }, { "@score":"1", "@id":"5960324", "info":{"authors":{"author":[{"@pid":"91/3723","text":"Anna Bogomolnaia"},{"@pid":"66/102","text":"Michel Le Breton"},{"@pid":"85/1376","text":"Alexei Savvateev"},{"@pid":"56/6291","text":"Shlomo Weber"}]},"title":"The egalitarian sharing rule in provision of public projects","venue":"CoRR","volume":"abs/cs/0503035","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503035","ee":"http://arxiv.org/abs/cs/0503035","url":"https://dblp.org/rec/journals/corr/abs-cs-0503035"}, "url":"URL#5960324" }, { "@score":"1", "@id":"5960325", "info":{"authors":{"author":[{"@pid":"75/5681","text":"Ricardo Corin"},{"@pid":"e/SandroEtalle","text":"Sandro Etalle"},{"@pid":"h/PieterHHartel","text":"Pieter H. Hartel"},{"@pid":"m/AngelikaMader","text":"Angelika Mader"}]},"title":"Timed Analysis of Security Protocols","venue":"CoRR","volume":"abs/cs/0503036","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503036","ee":"http://arxiv.org/abs/cs/0503036","url":"https://dblp.org/rec/journals/corr/abs-cs-0503036"}, "url":"URL#5960325" }, { "@score":"1", "@id":"5960326", "info":{"authors":{"author":{"@pid":"40/4633","text":"Zengyou He"}},"title":"Mining Top-k Approximate Frequent Patterns","venue":"CoRR","volume":"abs/cs/0503037","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503037","ee":"http://arxiv.org/abs/cs/0503037","url":"https://dblp.org/rec/journals/corr/abs-cs-0503037"}, "url":"URL#5960326" }, { "@score":"1", "@id":"5960327", "info":{"authors":{"author":{"@pid":"20/4772","text":"Armen Grigoryants"}},"title":"On a Kronecker products sum distance bounds","venue":"CoRR","volume":"abs/cs/0503038","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503038","ee":"http://arxiv.org/abs/cs/0503038","url":"https://dblp.org/rec/journals/corr/abs-cs-0503038"}, "url":"URL#5960327" }, { "@score":"1", "@id":"5960328", "info":{"authors":{"author":{"@pid":"l/LeonidALevin","text":"Leonid A. Levin"}},"title":"Notes for Miscellaneous Lectures","venue":"CoRR","volume":"abs/cs/0503039","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503039","ee":"http://arxiv.org/abs/cs/0503039","url":"https://dblp.org/rec/journals/corr/abs-cs-0503039"}, "url":"URL#5960328" }, { "@score":"1", "@id":"5960329", "info":{"authors":{"author":[{"@pid":"15/165","text":"Shalinee Kishore"},{"@pid":"36/1175","text":"Stuart C. Schwartz"},{"@pid":"41/2311","text":"Larry J. Greenstein"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Uplink Throughput in a Single-Macrocell/Single-Microcell CDMA System, with Application to Data Access Points","venue":"CoRR","volume":"abs/cs/0503040","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503040","ee":"http://arxiv.org/abs/cs/0503040","url":"https://dblp.org/rec/journals/corr/abs-cs-0503040"}, "url":"URL#5960329" }, { "@score":"1", "@id":"5960330", "info":{"authors":{"author":[{"@pid":"15/165","text":"Shalinee Kishore"},{"@pid":"41/2311","text":"Larry J. Greenstein"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"36/1175","text":"Stuart C. Schwartz"}]},"title":"Soft Handoff and Uplink Capacity in a Two-Tier CDMA System","venue":"CoRR","volume":"abs/cs/0503041","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503041","ee":"http://arxiv.org/abs/cs/0503041","url":"https://dblp.org/rec/journals/corr/abs-cs-0503041"}, "url":"URL#5960330" }, { "@score":"1", "@id":"5960331", "info":{"authors":{"author":[{"@pid":"15/165","text":"Shalinee Kishore"},{"@pid":"41/2311","text":"Larry J. Greenstein"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"},{"@pid":"36/1175","text":"Stuart C. Schwartz"}]},"title":"Uplink User Capacity in a CDMA System with Hotspot Microcells: Effects of Finite Transmit Power and Dispersion","venue":"CoRR","volume":"abs/cs/0503042","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503042","ee":"http://arxiv.org/abs/cs/0503042","url":"https://dblp.org/rec/journals/corr/abs-cs-0503042"}, "url":"URL#5960331" }, { "@score":"1", "@id":"5960332", "info":{"authors":{"author":{"@pid":"l/PLiberatore","text":"Paolo Liberatore"}},"title":"Complexity Issues in Finding Succinct Solutions of PSPACE-Complete Problems","venue":"CoRR","volume":"abs/cs/0503043","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503043","ee":"http://arxiv.org/abs/cs/0503043","url":"https://dblp.org/rec/journals/corr/abs-cs-0503043"}, "url":"URL#5960332" }, { "@score":"1", "@id":"5960333", "info":{"authors":{"author":[{"@pid":"34/2724","text":"Haixia Jia"},{"@pid":"m/CristopherMoore","text":"Cristopher Moore"},{"@pid":"21/2984","text":"Doug Strain"}]},"title":"Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively","venue":"CoRR","volume":"abs/cs/0503044","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503044","ee":"http://arxiv.org/abs/cs/0503044","url":"https://dblp.org/rec/journals/corr/abs-cs-0503044"}, "url":"URL#5960333" }, { "@score":"1", "@id":"5960334", "info":{"authors":{"author":[{"@pid":"57/4055","text":"Gregory E. Graham"},{"@pid":"10/29","text":"M. Anzar Afaq"},{"@pid":"e/DavidEvans-4","text":"David Evans 0004"},{"@pid":"70/5245","text":"Gerald Guglielmo"},{"@pid":"01/6493","text":"Eric Wicklund"},{"@pid":"04/3103","text":"Peter Love"}]},"title":"Contextual Constraint Modeling in Grid Application Workflows","venue":"CoRR","volume":"abs/cs/0503045","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503045","ee":"http://arxiv.org/abs/cs/0503045","url":"https://dblp.org/rec/journals/corr/abs-cs-0503045"}, "url":"URL#5960334" }, { "@score":"1", "@id":"5960335", "info":{"authors":{"author":[{"@pid":"34/4066","text":"Dimitris Achlioptas"},{"@pid":"34/2724","text":"Haixia Jia"},{"@pid":"m/CristopherMoore","text":"Cristopher Moore"}]},"title":"Hiding Satisfying Assignments: Two are Better than One","venue":"CoRR","volume":"abs/cs/0503046","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503046","ee":"http://arxiv.org/abs/cs/0503046","url":"https://dblp.org/rec/journals/corr/abs-cs-0503046"}, "url":"URL#5960335" }, { "@score":"1", "@id":"5960336", "info":{"authors":{"author":[{"@pid":"56/3165","text":"Christina Peraki"},{"@pid":"25/3280","text":"Sergio D. Servetto"}]},"title":"On Multiflows in Random Unit-Disk Graphs, and the Capacity of Some Wireless Networks","venue":"CoRR","volume":"abs/cs/0503047","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503047","ee":"http://arxiv.org/abs/cs/0503047","url":"https://dblp.org/rec/journals/corr/abs-cs-0503047"}, "url":"URL#5960336" }, { "@score":"1", "@id":"5960337", "info":{"authors":{"author":{"@pid":"04/2864","text":"Arindam Mitra"}},"title":"Is entanglement necessary to have unconditional security in quantum bit commitment ?","venue":"CoRR","volume":"abs/cs/0503048","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503048","ee":"http://arxiv.org/abs/cs/0503048","url":"https://dblp.org/rec/journals/corr/abs-cs-0503048"}, "url":"URL#5960337" }, { "@score":"1", "@id":"5960338", "info":{"authors":{"author":[{"@pid":"h/LaneAHemaspaandra","text":"Lane A. Hemaspaandra"},{"@pid":"r/JorgRothe","text":"Jörg Rothe"},{"@pid":"46/1686","text":"Amitabh Saxena"}]},"title":"Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory","venue":"CoRR","volume":"abs/cs/0503049","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503049","ee":"http://arxiv.org/abs/cs/0503049","url":"https://dblp.org/rec/journals/corr/abs-cs-0503049"}, "url":"URL#5960338" }, { "@score":"1", "@id":"5960339", "info":{"authors":{"author":[{"@pid":"48/5678","text":"Hanna E. Makaruk"},{"@pid":"90/57","text":"Robert Owczarek"},{"@pid":"13/1132","text":"Nikita A. Sakhanenko"}]},"title":"Systematic Method for Path-Complete White Box Testing","venue":"CoRR","volume":"abs/cs/0503050","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503050","ee":"http://arxiv.org/abs/cs/0503050","url":"https://dblp.org/rec/journals/corr/abs-cs-0503050"}, "url":"URL#5960339" }, { "@score":"1", "@id":"5960340", "info":{"authors":{"author":[{"@pid":"84/933","text":"Fengfeng Zhou"},{"@pid":"14/2048-1","text":"Guoliang Chen 0001"},{"@pid":"40/689","text":"Yinlong Xu"}]},"title":"Construction of Small Worlds in the Physical Topology of Wireless Networks","venue":"CoRR","volume":"abs/cs/0503051","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503051","ee":"http://arxiv.org/abs/cs/0503051","url":"https://dblp.org/rec/journals/corr/abs-cs-0503051"}, "url":"URL#5960340" }, { "@score":"1", "@id":"5960341", "info":{"authors":{"author":[{"@pid":"39/1177","text":"David Doty"},{"@pid":"74/3717","text":"Xiaoyang Gu"},{"@pid":"61/7036","text":"Jack H. Lutz"},{"@pid":"71/5254","text":"Elvira Mayordomo"},{"@pid":"66/5817","text":"Philippe Moser"}]},"title":"Zeta-Dimension","venue":"CoRR","volume":"abs/cs/0503052","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503052","ee":"http://arxiv.org/abs/cs/0503052","url":"https://dblp.org/rec/journals/corr/abs-cs-0503052"}, "url":"URL#5960341" }, { "@score":"1", "@id":"5960342", "info":{"authors":{"author":[{"@pid":"17/3582","text":"Carlos Miravet"},{"@pid":"59/5271","text":"Francisco de Borja Rodríguez"}]},"title":"A hybrid MLP-PNN architecture for fast image superresolution","venue":"CoRR","volume":"abs/cs/0503053","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503053","ee":"http://arxiv.org/abs/cs/0503053","url":"https://dblp.org/rec/journals/corr/abs-cs-0503053"}, "url":"URL#5960342" }, { "@score":"1", "@id":"5960343", "info":{"authors":{"author":{"@pid":"31/6786","text":"A. W. Overhauser"}},"title":"Analytic Definition of Curves and Surfaces by Parabolic Blending","venue":"CoRR","volume":"abs/cs/0503054","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503054","ee":"http://arxiv.org/abs/cs/0503054","url":"https://dblp.org/rec/journals/corr/abs-cs-0503054"}, "url":"URL#5960343" }, { "@score":"1", "@id":"5960344", "info":{"authors":{"author":[{"@pid":"53/2737","text":"Gianluca Amato"},{"@pid":"55/3914","text":"Francesca Scozzari"}]},"title":"Optimality in Goal-Dependent Analysis of Sharing","venue":"CoRR","volume":"abs/cs/0503055","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503055","ee":"http://arxiv.org/abs/cs/0503055","url":"https://dblp.org/rec/journals/corr/abs-cs-0503055"}, "url":"URL#5960344" }, { "@score":"1", "@id":"5960345", "info":{"authors":{"author":[{"@pid":"17/3582","text":"Carlos Miravet"},{"@pid":"56/1259","text":"Enrique Coiras"},{"@pid":"61/228","text":"Javier Santamaría"}]},"title":"Semi-automatic vectorization of linear networks on rasterized cartographic maps","venue":"CoRR","volume":"abs/cs/0503056","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503056","ee":"http://arxiv.org/abs/cs/0503056","url":"https://dblp.org/rec/journals/corr/abs-cs-0503056"}, "url":"URL#5960345" }, { "@score":"1", "@id":"5960346", "info":{"authors":{"author":[{"@pid":"63/2084","text":"Ion I. Mandoiu"},{"@pid":"t/DragosTrinca","text":"Dragos Trinca"}]},"title":"Exact and Approximation Algorithms for DNA Tag Set Design","venue":"CoRR","volume":"abs/cs/0503057","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503057","ee":"http://arxiv.org/abs/cs/0503057","url":"https://dblp.org/rec/journals/corr/abs-cs-0503057"}, "url":"URL#5960346" }, { "@score":"1", "@id":"5960347", "info":{"authors":{"author":[{"@pid":"s/MosheSchwartz","text":"Moshe Schwartz 0001"},{"@pid":"11/2669","text":"Alexander Vardy"}]},"title":"On the Stopping Distance and the Stopping Redundancy of Codes","venue":"CoRR","volume":"abs/cs/0503058","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503058","ee":"http://arxiv.org/abs/cs/0503058","url":"https://dblp.org/rec/journals/corr/abs-cs-0503058"}, "url":"URL#5960347" }, { "@score":"1", "@id":"5960348", "info":{"authors":{"author":{"@pid":"68/4702","text":"Laurent Krähenbühl"}},"title":"Les représentations génétiques d'objets : simples analogies ou modèles pertinents ? Le point de vue de l' "évolutique". - Genetic representations of objects : simple analogies or efficient models ? The "evolutic" point of view","venue":"CoRR","volume":"abs/cs/0503059","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503059","ee":"http://arxiv.org/abs/cs/0503059","url":"https://dblp.org/rec/journals/corr/abs-cs-0503059"}, "url":"URL#5960348" }, { "@score":"1", "@id":"5960349", "info":{"authors":{"author":{"@pid":"84/1421","text":"Quan Son Nguyen"}},"title":"Multi-Dimensional Hash Chains and Application to Micropayment Schemes","venue":"CoRR","volume":"abs/cs/0503060","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503060","ee":"http://arxiv.org/abs/cs/0503060","url":"https://dblp.org/rec/journals/corr/abs-cs-0503060"}, "url":"URL#5960349" }, { "@score":"1", "@id":"5960350", "info":{"authors":{"author":[{"@pid":"e/SandroEtalle","text":"Sandro Etalle"},{"@pid":"45/6818","text":"William H. Winsborough"}]},"title":"Integrity Constraints in Trust Management","venue":"CoRR","volume":"abs/cs/0503061","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503061","ee":"http://arxiv.org/abs/cs/0503061","url":"https://dblp.org/rec/journals/corr/abs-cs-0503061"}, "url":"URL#5960350" }, { "@score":"1", "@id":"5960351", "info":{"authors":{"author":{"@pid":"k/ChristophKoch","text":"Christoph Koch 0001"}},"title":"On the Complexity of Nonrecursive XQuery and Functional Query Languages on Complex Values","venue":"CoRR","volume":"abs/cs/0503062","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503062","ee":"http://arxiv.org/abs/cs/0503062","url":"https://dblp.org/rec/journals/corr/abs-cs-0503062"}, "url":"URL#5960351" }, { "@score":"1", "@id":"5960352", "info":{"authors":{"author":[{"@pid":"75/6451","text":"Dongning Guo"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Randomly Spread CDMA: Asymptotics via Statistical Physics","venue":"CoRR","volume":"abs/cs/0503063","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503063","ee":"http://arxiv.org/abs/cs/0503063","url":"https://dblp.org/rec/journals/corr/abs-cs-0503063"}, "url":"URL#5960352" }, { "@score":"1", "@id":"5960353", "info":{"authors":{"author":[{"@pid":"76/4174","text":"Desmond S. Lun"},{"@pid":"50/1092","text":"Niranjan Ratnakar"},{"@pid":"m/MurielMedard","text":"Muriel Médard"},{"@pid":"k/RalfKoetter","text":"Ralf Koetter"},{"@pid":"k/DavidRKarger","text":"David R. Karger"},{"@pid":"31/2709","text":"Tracey Ho"},{"@pid":"34/1154","text":"Ebad Ahmed"},{"@pid":"72/4898-1","text":"Fang Zhao 0001"}]},"title":"Minimum-Cost Multicast over Coded Packet Networks","venue":"CoRR","volume":"abs/cs/0503064","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503064","ee":"http://arxiv.org/abs/cs/0503064","url":"https://dblp.org/rec/journals/corr/abs-cs-0503064"}, "url":"URL#5960353" }, { "@score":"1", "@id":"5960354", "info":{"authors":{"author":[{"@pid":"d/DominiqueDuval","text":"Dominique Duval"},{"@pid":"91/3803","text":"Rachid Echahed"},{"@pid":"36/6266","text":"Frédéric Prost"}]},"title":"Data-Structure Rewriting","venue":"CoRR","volume":"abs/cs/0503065","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503065","ee":"http://arxiv.org/abs/cs/0503065","url":"https://dblp.org/rec/journals/corr/abs-cs-0503065"}, "url":"URL#5960354" }, { "@score":"1", "@id":"5960355", "info":{"authors":{"author":[{"@pid":"70/508","text":"Ali Ahmadinia"},{"@pid":"b/ChristopheBobda","text":"Christophe Bobda"},{"@pid":"28/6315","text":"Ji Ding"},{"@pid":"91/2870","text":"Mateusz Majer"},{"@pid":"t/JurgenTeich","text":"Jürgen Teich"},{"@pid":"f/SandorPFekete","text":"Sándor P. Fekete"},{"@pid":"65/707","text":"Jan van der Veen"}]},"title":"A Practical Approach for Circuit Routing on Dynamic Reconfigurable Devices","venue":"CoRR","volume":"abs/cs/0503066","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503066","ee":"http://arxiv.org/abs/cs/0503066","url":"https://dblp.org/rec/journals/corr/abs-cs-0503066"}, "url":"URL#5960355" }, { "@score":"1", "@id":"5960356", "info":{"authors":{"author":[{"@pid":"89/740","text":"Alan Jeffrey"},{"@pid":"42/3485","text":"Julian Rathke"}]},"title":"Contextual equivalence for higher-order pi-calculus revisited","venue":"CoRR","volume":"abs/cs/0503067","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503067","ee":"http://arxiv.org/abs/cs/0503067","url":"https://dblp.org/rec/journals/corr/abs-cs-0503067"}, "url":"URL#5960356" }, { "@score":"1", "@id":"5960357", "info":{"authors":{"author":{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"}},"title":"A Survey of Reverse Engineering and Program Comprehension","venue":"CoRR","volume":"abs/cs/0503068","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503068","ee":"http://arxiv.org/abs/cs/0503068","url":"https://dblp.org/rec/journals/corr/abs-cs-0503068"}, "url":"URL#5960357" }, { "@score":"1", "@id":"5960358", "info":{"authors":{"author":[{"@pid":"n/MichaelLNelson","text":"Michael L. Nelson"},{"@pid":"s/HerbertVandeSompel","text":"Herbert Van de Sompel"},{"@pid":"l/XiaomingLiu5","text":"Xiaoming Liu 0005"},{"@pid":"52/3505","text":"Terry L. Harrison"},{"@pid":"67/969","text":"Nathan McFarland"}]},"title":"mod_oai: An Apache Module for Metadata Harvesting","venue":"CoRR","volume":"abs/cs/0503069","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503069","ee":"http://arxiv.org/abs/cs/0503069","url":"https://dblp.org/rec/journals/corr/abs-cs-0503069"}, "url":"URL#5960358" }, { "@score":"1", "@id":"5960359", "info":{"authors":{"author":[{"@pid":"88/7185","text":"Juan P. Neirotti"},{"@pid":"57/1177","text":"David Saad"}]},"title":"Improved message passing for inference in densely connected systems","venue":"CoRR","volume":"abs/cs/0503070","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503070","ee":"http://arxiv.org/abs/cs/0503070","url":"https://dblp.org/rec/journals/corr/abs-cs-0503070"}, "url":"URL#5960359" }, { "@score":"1", "@id":"5960360", "info":{"authors":{"author":[{"@pid":"00/5004","text":"Joel B. Predd"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Consistency in Models for Distributed Learning under Communication Constraints","venue":"CoRR","volume":"abs/cs/0503071","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503071","ee":"http://arxiv.org/abs/cs/0503071","url":"https://dblp.org/rec/journals/corr/abs-cs-0503071"}, "url":"URL#5960360" }, { "@score":"1", "@id":"5960361", "info":{"authors":{"author":[{"@pid":"00/5004","text":"Joel B. Predd"},{"@pid":"52/6276","text":"Sanjeev R. Kulkarni"},{"@pid":"p/HVincentPoor","text":"H. Vincent Poor"}]},"title":"Distributed Learning in Wireless Sensor Networks","venue":"CoRR","volume":"abs/cs/0503072","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503072","ee":"http://arxiv.org/abs/cs/0503072","url":"https://dblp.org/rec/journals/corr/abs-cs-0503072"}, "url":"URL#5960361" }, { "@score":"1", "@id":"5960362", "info":{"authors":{"author":{"@pid":"126/3353","text":"Viktor T. Toth"}},"title":"Tensor manipulation in GPL Maxima","venue":"CoRR","volume":"abs/cs/0503073","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503073","ee":"http://arxiv.org/abs/cs/0503073","url":"https://dblp.org/rec/journals/corr/abs-cs-0503073"}, "url":"URL#5960362" }, { "@score":"1", "@id":"5960363", "info":{"authors":{"author":[{"@pid":"56/826","text":"Sameer Tilak"},{"@pid":"11/6725","text":"Bhanu Pisupati"},{"@pid":"65/4238","text":"Kenneth Chiu"},{"@pid":"01/485","text":"Geoffrey Brown"},{"@pid":"86/2654","text":"Nael B. Abu-Ghazaleh"}]},"title":"A File System Abstraction for Sense and Respond Systems","venue":"CoRR","volume":"abs/cs/0503074","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503074","ee":"http://arxiv.org/abs/cs/0503074","url":"https://dblp.org/rec/journals/corr/abs-cs-0503074"}, "url":"URL#5960363" }, { "@score":"1", "@id":"5960364", "info":{"authors":{"author":[{"@pid":"53/4422","text":"Wai-Yin Ng"},{"@pid":"33/4008","text":"W. K. Lin"},{"@pid":"24/4603","text":"Dah Ming Chiu"}]},"title":"Statistical Modelling of Information Sharing: Community, Membership and Content","venue":"CoRR","volume":"abs/cs/0503075","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503075","ee":"http://arxiv.org/abs/cs/0503075","url":"https://dblp.org/rec/journals/corr/abs-cs-0503075"}, "url":"URL#5960364" }, { "@score":"1", "@id":"5960365", "info":{"authors":{"author":[{"@pid":"34/1","text":"Marci Meingast"},{"@pid":"64/5222","text":"Christopher Geyer"},{"@pid":"s/ShankarSastry","text":"Shankar Sastry 0001"}]},"title":"Geometric Models of Rolling-Shutter Cameras","venue":"CoRR","volume":"abs/cs/0503076","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503076","ee":"http://arxiv.org/abs/cs/0503076","url":"https://dblp.org/rec/journals/corr/abs-cs-0503076"}, "url":"URL#5960365" }, { "@score":"1", "@id":"5960366", "info":{"authors":{"author":[{"@pid":"03/5448","text":"Mehryar Mohri"},{"@pid":"49/3721","text":"Fernando Pereira"},{"@pid":"73/924","text":"Michael Riley 0001"}]},"title":"Weighted Automata in Text and Speech Processing","venue":"CoRR","volume":"abs/cs/0503077","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503077","ee":"http://arxiv.org/abs/cs/0503077","url":"https://dblp.org/rec/journals/corr/abs-cs-0503077"}, "url":"URL#5960366" }, { "@score":"1", "@id":"5960367", "info":{"authors":{"author":[{"@pid":"74/6","text":"Angelo Luis Pagliosa"},{"@pid":"54/6515","text":"Claudio Cesar de Sá"},{"@pid":"52/4604","text":"Fernando Deeke Sasse"}]},"title":"Obtaining Membership Functions from a Neuron Fuzzy System extended by Kohonen Network","venue":"CoRR","volume":"abs/cs/0503078","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503078","ee":"http://arxiv.org/abs/cs/0503078","url":"https://dblp.org/rec/journals/corr/abs-cs-0503078"}, "url":"URL#5960367" }, { "@score":"1", "@id":"5960368", "info":{"authors":{"author":[{"@pid":"12/2571","text":"A. A. Prikhod'ko"},{"@pid":"19/807","text":"N. A. Prikhod'ko"}]},"title":"Space-time databases modeling global semantic networks","venue":"CoRR","volume":"abs/cs/0503079","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503079","ee":"http://arxiv.org/abs/cs/0503079","url":"https://dblp.org/rec/journals/corr/abs-cs-0503079"}, "url":"URL#5960368" }, { "@score":"1", "@id":"5960369", "info":{"authors":{"author":[{"@pid":"76/6462","text":"Uwe Hermann"},{"@pid":"66/3585-1","text":"Stefan Katzenbeisser 0001"},{"@pid":"s/ChristianSchallhart","text":"Christian Schallhart"},{"@pid":"v/HelmutVeith","text":"Helmut Veith"}]},"title":"Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments","venue":"CoRR","volume":"abs/cs/0503080","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503080","ee":"http://arxiv.org/abs/cs/0503080","url":"https://dblp.org/rec/journals/corr/abs-cs-0503080"}, "url":"URL#5960369" }, { "@score":"1", "@id":"5960370", "info":{"authors":{"author":[{"@pid":"40/4633","text":"Zengyou He"},{"@pid":"95/3275","text":"Xiaofei Xu"},{"@pid":"17/1394","text":"Shengchun Deng"}]},"title":"An Optimization Model for Outlier Detection in Categorical Data","venue":"CoRR","volume":"abs/cs/0503081","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503081","ee":"http://arxiv.org/abs/cs/0503081","url":"https://dblp.org/rec/journals/corr/abs-cs-0503081"}, "url":"URL#5960370" }, { "@score":"1", "@id":"5960371", "info":{"authors":{"author":[{"@pid":"35/5367","text":"Gabriel Istrate"},{"@pid":"b/SBoettcher","text":"Stefan Boettcher"},{"@pid":"55/1416","text":"Allon G. Percus"}]},"title":"Spines of Random Constraint Satisfaction Problems: Definition and Connection with Computational Complexity","venue":"CoRR","volume":"abs/cs/0503082","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503082","ee":"http://arxiv.org/abs/cs/0503082","url":"https://dblp.org/rec/journals/corr/abs-cs-0503082"}, "url":"URL#5960371" }, { "@score":"1", "@id":"5960372", "info":{"authors":{"author":{"@pid":"35/5367","text":"Gabriel Istrate"}},"title":"Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems","venue":"CoRR","volume":"abs/cs/0503083","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503083","ee":"http://arxiv.org/abs/cs/0503083","url":"https://dblp.org/rec/journals/corr/abs-cs-0503083"}, "url":"URL#5960372" }, { "@score":"1", "@id":"5960373", "info":{"authors":{"author":[{"@pid":"47/6249","text":"P. Nefyodov"},{"@pid":"20/861","text":"V. Reztsov"},{"@pid":"07/5516","text":"O. Riabinina"}]},"title":"The Peculiarities of Nonstationary Formation of Inhomogeneous Structures of Charged Particles in the Electrodiffusion Processes","venue":"CoRR","volume":"abs/cs/0503084","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503084","ee":"http://arxiv.org/abs/cs/0503084","url":"https://dblp.org/rec/journals/corr/abs-cs-0503084"}, "url":"URL#5960373" }, { "@score":"1", "@id":"5960374", "info":{"authors":{"author":{"@pid":"00/3487","text":"Travis Gagie"}},"title":"Dynamic Shannon Coding","venue":"CoRR","volume":"abs/cs/0503085","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503085","ee":"http://arxiv.org/abs/cs/0503085","url":"https://dblp.org/rec/journals/corr/abs-cs-0503085"}, "url":"URL#5960374" }, { "@score":"1", "@id":"5960375", "info":{"authors":{"author":{"@pid":"08/5833","text":"Joseph Morlier"}},"title":"Segmentation of the Homogeneity of a Signal Using a Piecewise Linear Recognition Tool","venue":"CoRR","volume":"abs/cs/0503086","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503086","ee":"http://arxiv.org/abs/cs/0503086","url":"https://dblp.org/rec/journals/corr/abs-cs-0503086"}, "url":"URL#5960375" }, { "@score":"1", "@id":"5960376", "info":{"authors":{"author":[{"@pid":"59/4027","text":"Reno Filla"},{"@pid":"99/5486","text":"Allan Ericsson"},{"@pid":"80/5494","text":"Jan-Ove Palmberg"}]},"title":"Dynamic Simulation of Construction Machinery: Towards an Operator Model","venue":"CoRR","volume":"abs/cs/0503087","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503087","ee":"http://arxiv.org/abs/cs/0503087","url":"https://dblp.org/rec/journals/corr/abs-cs-0503087"}, "url":"URL#5960376" }, { "@score":"1", "@id":"5960377", "info":{"authors":{"author":{"@pid":"37/3488","text":"Masahito Hayashi"}},"title":"General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel","venue":"CoRR","volume":"abs/cs/0503088","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503088","ee":"http://arxiv.org/abs/cs/0503088","url":"https://dblp.org/rec/journals/corr/abs-cs-0503088"}, "url":"URL#5960377" }, { "@score":"1", "@id":"5960378", "info":{"authors":{"author":{"@pid":"37/3488","text":"Masahito Hayashi"}},"title":"Second order asymptotics in fixed-length source coding and intrinsic randomness","venue":"CoRR","volume":"abs/cs/0503089","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503089","ee":"http://arxiv.org/abs/cs/0503089","url":"https://dblp.org/rec/journals/corr/abs-cs-0503089"}, "url":"URL#5960378" }, { "@score":"1", "@id":"5960379", "info":{"authors":{"author":[{"@pid":"47/1632","text":"David K. Arrowsmith"},{"@pid":"62/5150","text":"Mario di Bernardo"},{"@pid":"74/6012-1","text":"Francesco Sorrentino 0001"}]},"title":"Effects of variations of load distribution on network performance","venue":"CoRR","volume":"abs/cs/0503090","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503090","ee":"http://arxiv.org/abs/cs/0503090","url":"https://dblp.org/rec/journals/corr/abs-cs-0503090"}, "url":"URL#5960379" }, { "@score":"1", "@id":"5960380", "info":{"authors":{"author":[{"@pid":"69/52","text":"Tatsuaki Okamoto"},{"@pid":"07/5721","text":"Ryo Kashima"}]},"title":"Resource Bounded Unprovability of Computational Lower Bounds","venue":"CoRR","volume":"abs/cs/0503091","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503091","ee":"http://arxiv.org/abs/cs/0503091","url":"https://dblp.org/rec/journals/corr/abs-cs-0503091"}, "url":"URL#5960380" }, { "@score":"1", "@id":"5960381", "info":{"authors":{"author":[{"@pid":"c/JChomicki","text":"Jan Chomicki"},{"@pid":"53/3991","text":"Joyce Song"}]},"title":"Monotonic and Nonmonotonic Preference Revision","venue":"CoRR","volume":"abs/cs/0503092","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-cs-0503092","ee":"http://arxiv.org/abs/cs/0503092","url":"https://dblp.org/rec/journals/corr/abs-cs-0503092"}, "url":"URL#5960381" }, { "@score":"1", "@id":"5961297", "info":{"authors":{"author":[{"@pid":"38/6335","text":"Paulo Mateus"},{"@pid":"61/5698","text":"Amílcar Sernadas"}]},"title":"Weakly complete axiomatization of exogenous quantum propositional logic","venue":"CoRR","volume":"abs/math/0503453","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-math-0503453","ee":"http://arxiv.org/abs/math/0503453","url":"https://dblp.org/rec/journals/corr/abs-math-0503453"}, "url":"URL#5961297" }, { "@score":"1", "@id":"5961298", "info":{"authors":{"author":[{"@pid":"m/EMossel","text":"Elchanan Mossel"},{"@pid":"34/5965","text":"Ryan O'Donnell"},{"@pid":"30/3582","text":"Krzysztof Oleszkiewicz"}]},"title":"Noise stability of functions with low influences: invariance and optimality","venue":"CoRR","volume":"abs/math/0503503","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-math-0503503","ee":"http://arxiv.org/abs/math/0503503","url":"https://dblp.org/rec/journals/corr/abs-math-0503503"}, "url":"URL#5961298" }, { "@score":"1", "@id":"5961340", "info":{"authors":{"author":[{"@pid":"41/6585","text":"V. V. Kozlov"},{"@pid":"31/4594","text":"M. Yu. Mitrofanova"}]},"title":"Galton Board","venue":"CoRR","volume":"abs/nlin/0503024","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-nlin-0503024","ee":"http://arxiv.org/abs/nlin/0503024","url":"https://dblp.org/rec/journals/corr/abs-nlin-0503024"}, "url":"URL#5961340" }, { "@score":"1", "@id":"5961385", "info":{"authors":{"author":[{"@pid":"c/CCrepeau","text":"Claude Crépeau"},{"@pid":"g/DanielGottesman","text":"Daniel Gottesman"},{"@pid":"04/5072","text":"Adam D. Smith"}]},"title":"Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes","venue":"CoRR","volume":"abs/quant-ph/0503139","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-quant-ph-0503139","ee":"http://arxiv.org/abs/quant-ph/0503139","url":"https://dblp.org/rec/journals/corr/abs-quant-ph-0503139"}, "url":"URL#5961385" }, { "@score":"1", "@id":"5961386", "info":{"authors":{"author":[{"@pid":"88/6241","text":"Saied Hosseini-Khayat"},{"@pid":"35/337","text":"Iman Marvian"}]},"title":"Secure Communication Using Qubits","venue":"CoRR","volume":"abs/quant-ph/0503157","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-quant-ph-0503157","ee":"http://arxiv.org/abs/quant-ph/0503157","url":"https://dblp.org/rec/journals/corr/abs-quant-ph-0503157"}, "url":"URL#5961386" }, { "@score":"1", "@id":"5961387", "info":{"authors":{"author":{"@pid":"94/6096","text":"Vladimir E. Korepin"}},"title":"Optimization of Partial Search","venue":"CoRR","volume":"abs/quant-ph/0503238","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/corr/abs-quant-ph-0503238","ee":"http://arxiv.org/abs/quant-ph/0503238","url":"https://dblp.org/rec/journals/corr/abs-quant-ph-0503238"}, "url":"URL#5961387" }, { "@score":"1", "@id":"5962369", "info":{"title":"A Fast Combined Decimal Adder/Subtractor","venue":"CoRR","volume":"abs/cs/0503017","year":"2005","type":"Withdrawn Items","access":"withdrawn","key":"journals/corr/abs-cs-0503017","ee":"http://arxiv.org/abs/cs/0503017","url":"https://dblp.org/rec/journals/corr/abs-cs-0503017"}, "url":"URL#5962369" } ] } } } )