callback( { "result":{ "query":":facetid:toc:\"db/journals/corr/corr1504.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"79.11" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"1544", "@dc":"1544", "@oc":"1544", "@id":"43431296", "text":":facetid:toc:db/journals/corr/corr1504.bht" } }, "hits":{ "@total":"1544", "@computed":"1000", "@sent":"1000", "@first":"0", "hit":[{ "@score":"1", "@id":"3670505", "info":{"authors":{"author":[{"@pid":"90/834-1","text":"Johannes Fischer 0001"},{"@pid":"00/3487","text":"Travis Gagie"},{"@pid":"49/3088","text":"Pawel Gawrychowski"},{"@pid":"38/9892","text":"Tomasz Kociumaka"}]},"title":"Approximating LZ77 via Small-Space Multiple-Pattern Matching.","venue":"CoRR","volume":"abs/1504.06647","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001GGK15","ee":"http://arxiv.org/abs/1504.06647","url":"https://dblp.org/rec/journals/corr/0001GGK15"}, "url":"URL#3670505" }, { "@score":"1", "@id":"3670525", "info":{"authors":{"author":[{"@pid":"40/9185-1","text":"Mrinal Kumar 0001"},{"@pid":"75/7249","text":"Shubhangi Saraf"}]},"title":"Sums of products of polynomials in few variables : lower bounds and polynomial identity testing.","venue":"CoRR","volume":"abs/1504.06213","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0001S15a","ee":"http://arxiv.org/abs/1504.06213","url":"https://dblp.org/rec/journals/corr/0001S15a"}, "url":"URL#3670525" }, { "@score":"1", "@id":"3670546", "info":{"authors":{"author":[{"@pid":"72/6778-2","text":"Bo Xie 0002"},{"@pid":"88/7458","text":"Yingyu Liang"},{"@pid":"94/3481","text":"Le Song"}]},"title":"Scale Up Nonlinear Component Analysis with Doubly Stochastic Gradients.","venue":"CoRR","volume":"abs/1504.03655","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0002LS15","ee":"http://arxiv.org/abs/1504.03655","url":"https://dblp.org/rec/journals/corr/0002LS15"}, "url":"URL#3670546" }, { "@score":"1", "@id":"3670555", "info":{"authors":{"author":[{"@pid":"23/1112-2","text":"Weifeng Liu 0002"},{"@pid":"30/2521","text":"Brian Vinter"}]},"title":"A Framework for General Sparse Matrix-Matrix Multiplication on GPUs and Heterogeneous Processors.","venue":"CoRR","volume":"abs/1504.05022","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0002V15a","ee":"http://arxiv.org/abs/1504.05022","url":"https://dblp.org/rec/journals/corr/0002V15a"}, "url":"URL#3670555" }, { "@score":"1", "@id":"3670556", "info":{"authors":{"author":[{"@pid":"23/1112-2","text":"Weifeng Liu 0002"},{"@pid":"30/2521","text":"Brian Vinter"}]},"title":"Speculative Segmented Sum for Sparse Matrix-Vector Multiplication on Heterogeneous Processors.","venue":"CoRR","volume":"abs/1504.06474","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0002V15b","ee":"http://arxiv.org/abs/1504.06474","url":"https://dblp.org/rec/journals/corr/0002V15b"}, "url":"URL#3670556" }, { "@score":"1", "@id":"3670562", "info":{"authors":{"author":[{"@pid":"29/4549-3","text":"Mohit Garg 0003"},{"@pid":"89/5476","text":"Jaikumar Radhakrishnan"}]},"title":"Set Membership with a Few Bit Probes.","venue":"CoRR","volume":"abs/1504.02035","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0003R15a","ee":"http://arxiv.org/abs/1504.02035","url":"https://dblp.org/rec/journals/corr/0003R15a"}, "url":"URL#3670562" }, { "@score":"1", "@id":"3670564", "info":{"authors":{"author":[{"@pid":"28/4847-4","text":"Wenbo Wang 0004"},{"@pid":"50/6296","text":"Andres Kwasinski"},{"@pid":"76/440","text":"Dusit Niyato"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"A Survey on Applications of Model-Free Strategy Learning in Cognitive Wireless Networks.","venue":"CoRR","volume":"abs/1504.03976","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0004KNH15","ee":"http://arxiv.org/abs/1504.03976","url":"https://dblp.org/rec/journals/corr/0004KNH15"}, "url":"URL#3670564" }, { "@score":"1", "@id":"3670571", "info":{"authors":{"author":[{"@pid":"76/4015-5","text":"Lijun Zhang 0005"},{"@pid":"56/7047","text":"Tianbao Yang"},{"@pid":"j/RongJin","text":"Rong Jin 0001"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"}]},"title":"Analysis of Nuclear Norm Regularization for Full-rank Matrix Completion.","venue":"CoRR","volume":"abs/1504.06817","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0005YJZ15","ee":"http://arxiv.org/abs/1504.06817","url":"https://dblp.org/rec/journals/corr/0005YJZ15"}, "url":"URL#3670571" }, { "@score":"1", "@id":"3670580", "info":{"authors":{"author":[{"@pid":"47/2026-7","text":"Jun Zhao 0007"},{"@pid":"03/8395","text":"Osman Yagan"},{"@pid":"20/2659","text":"Virgil D. Gligor"}]},"title":"Random intersection graphs and their applications in security, wireless communication, and social networks.","venue":"CoRR","volume":"abs/1504.03161","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0007YG15e","ee":"http://arxiv.org/abs/1504.03161","url":"https://dblp.org/rec/journals/corr/0007YG15e"}, "url":"URL#3670580" }, { "@score":"1", "@id":"3670585", "info":{"authors":{"author":[{"@pid":"51/3710-18","text":"Yang Liu 0018"},{"@pid":"97/5725","text":"Mingyan Liu"}]},"title":"An Online Approach to Dynamic Channel Access and Transmission Scheduling.","venue":"CoRR","volume":"abs/1504.01050","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/0018L15","ee":"http://arxiv.org/abs/1504.01050","url":"https://dblp.org/rec/journals/corr/0018L15"}, "url":"URL#3670585" }, { "@score":"1", "@id":"3670598", "info":{"authors":{"author":[{"@pid":"56/1358","text":"Scott Aaronson"},{"@pid":"119/5097","text":"Daniel Grier"},{"@pid":"18/9367","text":"Luke Schaeffer"}]},"title":"The Classification of Reversible Bit Operations.","venue":"CoRR","volume":"abs/1504.05155","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AaronsonGS15","ee":"http://arxiv.org/abs/1504.05155","url":"https://dblp.org/rec/journals/corr/AaronsonGS15"}, "url":"URL#3670598" }, { "@score":"1", "@id":"3670623", "info":{"authors":{"author":[{"@pid":"84/5016","text":"Emmanuel Abbe"},{"@pid":"70/10260","text":"Katherine Edwards"}]},"title":"Concentration of the number of solutions of random planted CSPs and Goldreich's one-way candidates.","venue":"CoRR","volume":"abs/1504.08316","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbbeE15","ee":"http://arxiv.org/abs/1504.08316","url":"https://dblp.org/rec/journals/corr/AbbeE15"}, "url":"URL#3670623" }, { "@score":"1", "@id":"3670635", "info":{"authors":{"author":[{"@pid":"129/1654","text":"Amir Abboud"},{"@pid":"74/10669","text":"Arturs Backurs"},{"@pid":"63/8319","text":"Virginia Vassilevska Williams"}]},"title":"If the Current Clique Algorithms are Optimal, so is Valiant's Parser.","venue":"CoRR","volume":"abs/1504.01431","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbboudBW15a","ee":"http://arxiv.org/abs/1504.01431","url":"https://dblp.org/rec/journals/corr/AbboudBW15a"}, "url":"URL#3670635" }, { "@score":"1", "@id":"3670703", "info":{"authors":{"author":[{"@pid":"36/5720","text":"Ittai Abraham"},{"@pid":"d/DannyDolev","text":"Danny Dolev"}]},"title":"Byzantine Agreement with Optimal Early Stopping, Optimal Resilience and Polynomial Complexity.","venue":"CoRR","volume":"abs/1504.02547","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbrahamD15","ee":"http://arxiv.org/abs/1504.02547","url":"https://dblp.org/rec/journals/corr/AbrahamD15"}, "url":"URL#3670703" }, { "@score":"1", "@id":"3670730", "info":{"authors":{"author":[{"@pid":"161/9956","text":"Firas Abuzaid"},{"@pid":"32/10927","text":"Stefan Hadjis"},{"@pid":"97/919-1","text":"Ce Zhang 0001"},{"@pid":"r/ChristopherRe","text":"Christopher Ré"}]},"title":"Caffe con Troll: Shallow Ideas to Speed Up Deep Learning.","venue":"CoRR","volume":"abs/1504.04343","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AbuzaidHZR15","ee":"http://arxiv.org/abs/1504.04343","url":"https://dblp.org/rec/journals/corr/AbuzaidHZR15"}, "url":"URL#3670730" }, { "@score":"1", "@id":"3670743", "info":{"authors":{"author":[{"@pid":"52/638","text":"Yves Achdou"},{"@pid":"34/9513","text":"Alessio Porretta"}]},"title":"Convergence of a finite difference scheme to weak solutions of the system of partial differential equation arising in mean field games.","venue":"CoRR","volume":"abs/1504.05705","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AchdouP15","ee":"http://arxiv.org/abs/1504.05705","url":"https://dblp.org/rec/journals/corr/AchdouP15"}, "url":"URL#3670743" }, { "@score":"1", "@id":"3670768", "info":{"authors":{"author":[{"@pid":"a/JiriAdamek","text":"Jirí Adámek"},{"@pid":"m/StefanMilius","text":"Stefan Milius"},{"@pid":"131/2343","text":"Henning Urbat"}]},"title":"Syntactic Monoids in a Category.","venue":"CoRR","volume":"abs/1504.02694","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdamekMU15","ee":"http://arxiv.org/abs/1504.02694","url":"https://dblp.org/rec/journals/corr/AdamekMU15"}, "url":"URL#3670768" }, { "@score":"1", "@id":"3670776", "info":{"authors":{"author":[{"@pid":"00/1274","text":"Kira V. Adaricheva"},{"@pid":"10/6666","text":"James B. Nation"}]},"title":"Discovery of the D-basis in binary tables based on hypergraph dualization.","venue":"CoRR","volume":"abs/1504.02875","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdarichevaN15","ee":"http://arxiv.org/abs/1504.02875","url":"https://dblp.org/rec/journals/corr/AdarichevaN15"}, "url":"URL#3670776" }, { "@score":"1", "@id":"3670778", "info":{"authors":{"author":[{"@pid":"56/2679","text":"Louigi Addario-Berry"},{"@pid":"06/8421","text":"Borja Balle"},{"@pid":"02/9367","text":"Guillem Perarnau"}]},"title":"Diameter and Stationary Distribution of Random $r$-out Digraphs.","venue":"CoRR","volume":"abs/1504.06840","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Addario-BerryBP15","ee":"http://arxiv.org/abs/1504.06840","url":"https://dblp.org/rec/journals/corr/Addario-BerryBP15"}, "url":"URL#3670778" }, { "@score":"1", "@id":"3670792", "info":{"authors":{"author":{"@pid":"05/5861","text":"David Adjiashvili"}},"title":"Non-Uniform Robust Network Design in Planar Graphs.","venue":"CoRR","volume":"abs/1504.05009","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Adjiashvili15","ee":"http://arxiv.org/abs/1504.05009","url":"https://dblp.org/rec/journals/corr/Adjiashvili15"}, "url":"URL#3670792" }, { "@score":"1", "@id":"3670794", "info":{"authors":{"author":[{"@pid":"162/0072","text":"Emily Adlam"},{"@pid":"76/2163","text":"Adrian Kent"}]},"title":"Deterministic Relativistic Quantum Bit Commitment.","venue":"CoRR","volume":"abs/1504.00943","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdlamK15","ee":"http://arxiv.org/abs/1504.00943","url":"https://dblp.org/rec/journals/corr/AdlamK15"}, "url":"URL#3670794" }, { "@score":"1", "@id":"3670795", "info":{"authors":{"author":[{"@pid":"162/0072","text":"Emily Adlam"},{"@pid":"76/2163","text":"Adrian Kent"}]},"title":"Device-Independent Relativistic Quantum Bit Commitment.","venue":"CoRR","volume":"abs/1504.00944","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AdlamK15a","ee":"http://arxiv.org/abs/1504.00944","url":"https://dblp.org/rec/journals/corr/AdlamK15a"}, "url":"URL#3670795" }, { "@score":"1", "@id":"3670817", "info":{"authors":{"author":[{"@pid":"a/FotoNAfrati","text":"Foto N. Afrati"},{"@pid":"u/JeffreyDUllman","text":"Jeffrey D. Ullman"},{"@pid":"47/8481","text":"Angelos Vasilakopoulos"}]},"title":"Handling Skew in Multiway Joins in Parallel Processing.","venue":"CoRR","volume":"abs/1504.03247","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AfratiUV15","ee":"http://arxiv.org/abs/1504.03247","url":"https://dblp.org/rec/journals/corr/AfratiUV15"}, "url":"URL#3670817" }, { "@score":"1", "@id":"3670819", "info":{"authors":{"author":[{"@pid":"153/2217","text":"Farzana Afrin"},{"@pid":"69/11464","text":"Mohammad Saiedur Rahaman"},{"@pid":"119/4928","text":"Mohammad Saidur Rahman 0001"},{"@pid":"162/0222","text":"Mashiour Rahman"}]},"title":"Student Satisfaction mining in a typical core course of Computer Science.","venue":"CoRR","volume":"abs/1504.04116","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AfrinRRR15","ee":"http://arxiv.org/abs/1504.04116","url":"https://dblp.org/rec/journals/corr/AfrinRRR15"}, "url":"URL#3670819" }, { "@score":"1", "@id":"3670833", "info":{"authors":{"author":[{"@pid":"a/PankajKAgarwal","text":"Pankaj K. Agarwal"},{"@pid":"g/JieGao","text":"Jie Gao 0001"},{"@pid":"g/LeonidasJGuibas","text":"Leonidas J. Guibas"},{"@pid":"48/3950","text":"Haim Kaplan"},{"@pid":"17/2620","text":"Natan Rubin"},{"@pid":"s/MichaSharir","text":"Micha Sharir"}]},"title":"Stable Delaunay Graphs.","venue":"CoRR","volume":"abs/1504.06851","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalGGKRS15","ee":"http://arxiv.org/abs/1504.06851","url":"https://dblp.org/rec/journals/corr/AgarwalGGKRS15"}, "url":"URL#3670833" }, { "@score":"1", "@id":"3670834", "info":{"authors":{"author":[{"@pid":"37/2620","text":"Saurabh Agarwal"},{"@pid":"162/0078","text":"Punit Kumar Johari"}]},"title":"A Novel Approach to Develop a New Hybrid Technique for Trademark Image Retrieval.","venue":"CoRR","volume":"abs/1504.03315","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalJ15","ee":"http://arxiv.org/abs/1504.03315","url":"https://dblp.org/rec/journals/corr/AgarwalJ15"}, "url":"URL#3670834" }, { "@score":"1", "@id":"3670835", "info":{"authors":{"author":[{"@pid":"161/9989","text":"Vandit Agarwal"},{"@pid":"162/0020","text":"Mandhani Kushal"},{"@pid":"03/10983","text":"Preetham Kumar"}]},"title":"An Improvised Frequent Pattern Tree Based Association Rule Mining Technique with Mining Frequent Item Sets Algorithm and a Modified Header Table.","venue":"CoRR","volume":"abs/1504.07018","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgarwalKK15","ee":"http://arxiv.org/abs/1504.07018","url":"https://dblp.org/rec/journals/corr/AgarwalKK15"}, "url":"URL#3670835" }, { "@score":"1", "@id":"3670845", "info":{"authors":{"author":[{"@pid":"55/2543","text":"Ameya Agaskar"},{"@pid":"39/6975","text":"Yue M. Lu"}]},"title":"Optimal Detection of Random Walks on Graphs: Performance Analysis via Statistical Physics.","venue":"CoRR","volume":"abs/1504.06924","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AgaskarL15","ee":"http://arxiv.org/abs/1504.06924","url":"https://dblp.org/rec/journals/corr/AgaskarL15"}, "url":"URL#3670845" }, { "@score":"1", "@id":"3670848", "info":{"authors":{"author":[{"@pid":"00/3379","text":"Divesh Aggarwal"},{"@pid":"07/3765","text":"Daniel Dadush"},{"@pid":"143/4482","text":"Noah Stephens-Davidowitz"}]},"title":"Solving the Closest Vector Problem in $2n$ Time - The Discrete Gaussian Strikes Again!","venue":"CoRR","volume":"abs/1504.01995","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AggarwalDS15","ee":"http://arxiv.org/abs/1504.01995","url":"https://dblp.org/rec/journals/corr/AggarwalDS15"}, "url":"URL#3670848" }, { "@score":"1", "@id":"3670889", "info":{"authors":{"author":[{"@pid":"24/3366","text":"Rizwan Ahmad"},{"@pid":"s/PhilipSchniter","text":"Philip Schniter"}]},"title":"Iteratively Reweighted ℓ1 Approaches to Sparse Composite Regularization.","venue":"CoRR","volume":"abs/1504.05110","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmadS15","ee":"http://arxiv.org/abs/1504.05110","url":"https://dblp.org/rec/journals/corr/AhmadS15"}, "url":"URL#3670889" }, { "@score":"1", "@id":"3670897", "info":{"authors":{"author":[{"@pid":"51/7139","text":"Amir Ali Ahmadi"},{"@pid":"37/2816","text":"Raphaël M. Jungers"}]},"title":"Lower Bounds on Complexity of Lyapunov Functions for Switched Linear Systems.","venue":"CoRR","volume":"abs/1504.03761","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmadiJ15","ee":"http://arxiv.org/abs/1504.03761","url":"https://dblp.org/rec/journals/corr/AhmadiJ15"}, "url":"URL#3670897" }, { "@score":"1", "@id":"3670898", "info":{"authors":{"author":[{"@pid":"51/7139","text":"Amir Ali Ahmadi"},{"@pid":"116/6436","text":"Anirudha Majumdar"}]},"title":"Some Applications of Polynomial Optimization in Operations Research and Real-Time Decision Making.","venue":"CoRR","volume":"abs/1504.06002","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmadiM15","ee":"http://arxiv.org/abs/1504.06002","url":"https://dblp.org/rec/journals/corr/AhmadiM15"}, "url":"URL#3670898" }, { "@score":"1", "@id":"3670901", "info":{"authors":{"author":[{"@pid":"144/7684","text":"Arman Ahmadzadeh"},{"@pid":"92/10836","text":"Adam Noel"},{"@pid":"59/7250","text":"Andreas Burkovski"},{"@pid":"95/2265","text":"Robert Schober"}]},"title":"Amplify-and-Forward Relaying in Two-Hop Diffusion-Based Molecular Communication Networks.","venue":"CoRR","volume":"abs/1504.03738","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmadzadehNBS15","ee":"http://arxiv.org/abs/1504.03738","url":"https://dblp.org/rec/journals/corr/AhmadzadehNBS15"}, "url":"URL#3670901" }, { "@score":"1", "@id":"3670904", "info":{"authors":{"author":[{"@pid":"161/9822","text":"Karam Ahmed"},{"@pid":"47/10060","text":"Sherif M. Abuelenin"},{"@pid":"242/0349","text":"Heba Y. M. Soliman"},{"@pid":"162/0160","text":"Khairy Sayed Al-Barbary"}]},"title":"Low Complexity V-BLAST MIMO-OFDM Detector by Successive Iterations Reduction.","venue":"CoRR","volume":"abs/1504.01617","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhmedASA15","ee":"http://arxiv.org/abs/1504.01617","url":"https://dblp.org/rec/journals/corr/AhmedASA15"}, "url":"URL#3670904" }, { "@score":"1", "@id":"3670926", "info":{"authors":{"author":[{"@pid":"12/8910","text":"Benedikt Ahrens"},{"@pid":"143/7306","text":"Paolo Capriotti"},{"@pid":"140/7288","text":"Régis Spadotti"}]},"title":"Non-wellfounded trees in Homotopy Type Theory.","venue":"CoRR","volume":"abs/1504.02949","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhrensCS15","ee":"http://arxiv.org/abs/1504.02949","url":"https://dblp.org/rec/journals/corr/AhrensCS15"}, "url":"URL#3670926" }, { "@score":"1", "@id":"3670927", "info":{"authors":{"author":[{"@pid":"49/3122","text":"Nitin Ahuja"},{"@pid":"b/MatthiasBender2","text":"Matthias Bender 0002"},{"@pid":"s/PeterSanders","text":"Peter Sanders 0001"},{"@pid":"10/1388-3","text":"Christian Schulz 0003"},{"@pid":"09/6351","text":"Andreas Wagner"}]},"title":"Incorporating Road Networks into Territory Design.","venue":"CoRR","volume":"abs/1504.07846","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhujaBS0W15","ee":"http://arxiv.org/abs/1504.07846","url":"https://dblp.org/rec/journals/corr/AhujaBS0W15"}, "url":"URL#3670927" }, { "@score":"1", "@id":"3670930", "info":{"authors":{"author":[{"@pid":"154/3619","text":"Kartik Ahuja"},{"@pid":"92/55","text":"Yuanzhang Xiao"},{"@pid":"s/MihaelavanderSchaar","text":"Mihaela van der Schaar"}]},"title":"Efficient Interference Management Policies for Femtocell Networks.","venue":"CoRR","volume":"abs/1504.07009","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AhujaXS15","ee":"http://arxiv.org/abs/1504.07009","url":"https://dblp.org/rec/journals/corr/AhujaXS15"}, "url":"URL#3670930" }, { "@score":"1", "@id":"3670944", "info":{"authors":{"author":{"@pid":"62/10451","text":"Christoph Aistleitner"}},"title":"Fully explicit large deviation inequalities for empirical processes with applications to information-based complexity.","venue":"CoRR","volume":"abs/1504.00143","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Aistleitner15","ee":"http://arxiv.org/abs/1504.00143","url":"https://dblp.org/rec/journals/corr/Aistleitner15"}, "url":"URL#3670944" }, { "@score":"1", "@id":"3670946", "info":{"authors":{"author":[{"@pid":"90/6616","text":"C. Aiswarya"},{"@pid":"b/BenediktBollig","text":"Benedikt Bollig"},{"@pid":"g/PaulGastin","text":"Paul Gastin"}]},"title":"An Automata-Theoretic Approach to the Verification of Distributed Algorithms.","venue":"CoRR","volume":"abs/1504.06534","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AiswaryaBG15","ee":"http://arxiv.org/abs/1504.06534","url":"https://dblp.org/rec/journals/corr/AiswaryaBG15"}, "url":"URL#3670946" }, { "@score":"1", "@id":"3671000", "info":{"authors":{"author":[{"@pid":"151/6688","text":"Bassam AlKindy"},{"@pid":"156/1276","text":"Huda Al-Nayyef"},{"@pid":"98/722","text":"Christophe Guyeux"},{"@pid":"16/3445","text":"Jean-François Couchot"},{"@pid":"09/2246","text":"Michel Salomon"},{"@pid":"58/5562","text":"Jacques M. Bahi"}]},"title":"Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species.","venue":"CoRR","volume":"abs/1504.06110","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlKindyAGCSB15","ee":"http://arxiv.org/abs/1504.06110","url":"https://dblp.org/rec/journals/corr/AlKindyAGCSB15"}, "url":"URL#3671000" }, { "@score":"1", "@id":"3671001", "info":{"authors":{"author":[{"@pid":"151/6688","text":"Bassam AlKindy"},{"@pid":"98/722","text":"Christophe Guyeux"},{"@pid":"16/3445","text":"Jean-François Couchot"},{"@pid":"09/2246","text":"Michel Salomon"},{"@pid":"25/10874","text":"Christian Parisod"},{"@pid":"58/5562","text":"Jacques M. Bahi"}]},"title":"Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes.","venue":"CoRR","volume":"abs/1504.05095","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlKindyGCSPB15","ee":"http://arxiv.org/abs/1504.05095","url":"https://dblp.org/rec/journals/corr/AlKindyGCSPB15"}, "url":"URL#3671001" }, { "@score":"1", "@id":"3671010", "info":{"authors":{"author":[{"@pid":"60/10586","text":"Mohammad Alaggan"},{"@pid":"09/2378","text":"Sébastien Gambs"},{"@pid":"86/676","text":"Anne-Marie Kermarrec"}]},"title":"Heterogeneous Differential Privacy.","venue":"CoRR","volume":"abs/1504.06998","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlagganGK15","ee":"http://arxiv.org/abs/1504.06998","url":"https://dblp.org/rec/journals/corr/AlagganGK15"}, "url":"URL#3671010" }, { "@score":"1", "@id":"3671027", "info":{"authors":{"author":[{"@pid":"32/9944","text":"Mansaf Alam"},{"@pid":"157/8305","text":"Shuchi Sethi"}]},"title":"Covert Channel Detection framework for cloud using distributed machine learning.","venue":"CoRR","volume":"abs/1504.03539","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlamS15b","ee":"http://arxiv.org/abs/1504.03539","url":"https://dblp.org/rec/journals/corr/AlamS15b"}, "url":"URL#3671027" }, { "@score":"1", "@id":"3671065", "info":{"authors":{"author":[{"@pid":"a/NatashaAlechina","text":"Natasha Alechina"},{"@pid":"81/6813","text":"Brian Logan 0001"},{"@pid":"21/2630","text":"Nguyen Hoang Nga"},{"@pid":"58/461","text":"Franco Raimondi"}]},"title":"Technical Report: Model-Checking for Resource-Bounded ATL with Production and Consumption of Resources.","venue":"CoRR","volume":"abs/1504.06766","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlechinaLNR15","ee":"http://arxiv.org/abs/1504.06766","url":"https://dblp.org/rec/journals/corr/AlechinaLNR15"}, "url":"URL#3671065" }, { "@score":"1", "@id":"3671080", "info":{"authors":{"author":[{"@pid":"80/7769","text":"Homa Alemzadeh"},{"@pid":"12/5088-1","text":"Daniel Chen 0001"},{"@pid":"24/2147","text":"Andrew Lewis"},{"@pid":"18/5985","text":"Zbigniew Kalbarczyk"},{"@pid":"i/RavishankarKIyer","text":"Ravishankar K. Iyer"}]},"title":"Systems-theoretic Safety Assessment of Robotic Telesurgical Systems.","venue":"CoRR","volume":"abs/1504.07135","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlemzadehCLKI15","ee":"http://arxiv.org/abs/1504.07135","url":"https://dblp.org/rec/journals/corr/AlemzadehCLKI15"}, "url":"URL#3671080" }, { "@score":"1", "@id":"3671095", "info":{"authors":{"author":[{"@pid":"162/0122","text":"Maitham Makki Alhubail"},{"@pid":"59/5241-1","text":"Qiqi Wang 0001"}]},"title":"The swept rule for breaking the latency barrier in time advancing PDEs.","venue":"CoRR","volume":"abs/1504.01380","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlhubailW15","ee":"http://arxiv.org/abs/1504.01380","url":"https://dblp.org/rec/journals/corr/AlhubailW15"}, "url":"URL#3671095" }, { "@score":"1", "@id":"3671102", "info":{"authors":{"author":[{"@pid":"157/1356","text":"Heider K. Ali"},{"@pid":"74/8108","text":"Anthony D. Whitehead"}]},"title":"Image Subset Selection Using Gabor Filters and Neural Networks.","venue":"CoRR","volume":"abs/1504.01954","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AliW15","ee":"http://arxiv.org/abs/1504.01954","url":"https://dblp.org/rec/journals/corr/AliW15"}, "url":"URL#3671102" }, { "@score":"1", "@id":"3671117", "info":{"authors":{"author":[{"@pid":"32/6026","text":"Ville Alkkiomäki"},{"@pid":"50/6770","text":"Kari Smolander"}]},"title":"Observations of service identification from two enterprises.","venue":"CoRR","volume":"abs/1504.02408","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlkkiomakiS15","ee":"http://arxiv.org/abs/1504.02408","url":"https://dblp.org/rec/journals/corr/AlkkiomakiS15"}, "url":"URL#3671117" }, { "@score":"1", "@id":"3671133", "info":{"authors":{"author":[{"@pid":"91/11150","text":"Lírio Onofre Baptista de Almeida"},{"@pid":"49/11148","text":"Paulo Matias"},{"@pid":"158/8057","text":"Rafael Tuma Guariento"}]},"title":"An embedded system for real-time feedback neuroscience experiments.","venue":"CoRR","volume":"abs/1504.00932","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlmeidaMG15","ee":"http://arxiv.org/abs/1504.00932","url":"https://dblp.org/rec/journals/corr/AlmeidaMG15"}, "url":"URL#3671133" }, { "@score":"1", "@id":"3671137", "info":{"authors":{"author":[{"@pid":"140/7607","text":"Maha Alodeh"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Energy-Efficient Symbol-Level Precoding in Multiuser MISO Based on Relaxed Detection Region.","venue":"CoRR","volume":"abs/1504.06749","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlodehCO15","ee":"http://arxiv.org/abs/1504.06749","url":"https://dblp.org/rec/journals/corr/AlodehCO15"}, "url":"URL#3671137" }, { "@score":"1", "@id":"3671138", "info":{"authors":{"author":[{"@pid":"140/7607","text":"Maha Alodeh"},{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Constructive Interference through Symbol Level Precoding for Multi-level Modulation.","venue":"CoRR","volume":"abs/1504.06750","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlodehCO15a","ee":"http://arxiv.org/abs/1504.06750","url":"https://dblp.org/rec/journals/corr/AlodehCO15a"}, "url":"URL#3671138" }, { "@score":"1", "@id":"3671142", "info":{"authors":{"author":[{"@pid":"87/1307","text":"Alessandro Aloisio"},{"@pid":"21/1998","text":"Marco Autili"},{"@pid":"162/0118","text":"Alfredo D'Angelo"},{"@pid":"161/9911","text":"Antti Viidanoja"},{"@pid":"33/4545","text":"Jérémie Leguay"},{"@pid":"162/0076","text":"Tobias Ginzler"},{"@pid":"273/7308","text":"Thorsten A. Lampe"},{"@pid":"161/9852","text":"Luca Spagnolo"},{"@pid":"w/StephenDWolthusen","text":"Stephen D. Wolthusen"},{"@pid":"13/7384","text":"Adam Flizikowski"},{"@pid":"98/10105","text":"Joanna Sliwa"}]},"title":"TACTICS: TACTICal Service Oriented Architecture.","venue":"CoRR","volume":"abs/1504.07578","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AloisioADVLGLSW15","ee":"http://arxiv.org/abs/1504.07578","url":"https://dblp.org/rec/journals/corr/AloisioADVLGLSW15"}, "url":"URL#3671142" }, { "@score":"1", "@id":"3671144", "info":{"authors":{"author":[{"@pid":"155/9937","text":"Zakaria Alomari"},{"@pid":"129/1679","text":"Oualid El Halimi"},{"@pid":"162/0223","text":"Kaushik Sivaprasad"},{"@pid":"161/9813","text":"Chitrang Pandit"}]},"title":"Comparative Studies of Six Programming Languages.","venue":"CoRR","volume":"abs/1504.00693","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlomariHSP15","ee":"http://arxiv.org/abs/1504.00693","url":"https://dblp.org/rec/journals/corr/AlomariHSP15"}, "url":"URL#3671144" }, { "@score":"1", "@id":"3671147", "info":{"authors":{"author":[{"@pid":"a/NAlon","text":"Noga Alon"},{"@pid":"n/NoamNisan","text":"Noam Nisan"},{"@pid":"91/5912","text":"Ran Raz"},{"@pid":"85/9060","text":"Omri Weinstein"}]},"title":"Welfare Maximization with Limited Interaction.","venue":"CoRR","volume":"abs/1504.01780","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlonNRW15","ee":"http://arxiv.org/abs/1504.01780","url":"https://dblp.org/rec/journals/corr/AlonNRW15"}, "url":"URL#3671147" }, { "@score":"1", "@id":"3671150", "info":{"authors":{"author":[{"@pid":"161/9960","text":"Bushra Aloraini"},{"@pid":"47/5574","text":"Daryl Johnson"},{"@pid":"08/284","text":"Bill Stackpole"},{"@pid":"78/6097","text":"Sumita Mishra"}]},"title":"A New Covert Channel over Cellular Voice Channel in Smartphones.","venue":"CoRR","volume":"abs/1504.05647","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlorainiJSM15","ee":"http://arxiv.org/abs/1504.05647","url":"https://dblp.org/rec/journals/corr/AlorainiJSM15"}, "url":"URL#3671150" }, { "@score":"1", "@id":"3671159", "info":{"authors":{"author":[{"@pid":"161/9891","text":"Hayat Alrefaie"},{"@pid":"03/1543","text":"Allan Ramsay"}]},"title":"Supporting Language Learners with the Meanings Of Closed Class Items.","venue":"CoRR","volume":"abs/1504.02059","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlrefaieR15","ee":"http://arxiv.org/abs/1504.02059","url":"https://dblp.org/rec/journals/corr/AlrefaieR15"}, "url":"URL#3671159" }, { "@score":"1", "@id":"3671173", "info":{"authors":{"author":[{"@pid":"49/4269","text":"Stephen Alstrup"},{"@pid":"139/4227","text":"Søren Dahlgaard"},{"@pid":"143/7256","text":"Mathias Bæk Tejs Knudsen"}]},"title":"Optimal induced universal graphs and adjacency labeling for trees.","venue":"CoRR","volume":"abs/1504.02306","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlstrupDK15","ee":"http://arxiv.org/abs/1504.02306","url":"https://dblp.org/rec/journals/corr/AlstrupDK15"}, "url":"URL#3671173" }, { "@score":"1", "@id":"3671175", "info":{"authors":{"author":[{"@pid":"49/4269","text":"Stephen Alstrup"},{"@pid":"g/CyrilGavoille","text":"Cyril Gavoille"},{"@pid":"139/0746","text":"Esben Bistrup Halvorsen"},{"@pid":"p/HolgerPetersen","text":"Holger Petersen 0001"}]},"title":"Simpler, faster and shorter labels for distances in graphs.","venue":"CoRR","volume":"abs/1504.04498","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlstrupGHP15","ee":"http://arxiv.org/abs/1504.04498","url":"https://dblp.org/rec/journals/corr/AlstrupGHP15"}, "url":"URL#3671175" }, { "@score":"1", "@id":"3671186", "info":{"authors":{"author":[{"@pid":"36/7942","text":"Günes Aluç"},{"@pid":"o/MTamerOzsu","text":"M. Tamer Özsu"},{"@pid":"d/KhuzaimaDaudjee","text":"Khuzaima Daudjee"}]},"title":"Clustering RDF Databases Using Tunable-LSH.","venue":"CoRR","volume":"abs/1504.02523","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AlucOD15","ee":"http://arxiv.org/abs/1504.02523","url":"https://dblp.org/rec/journals/corr/AlucOD15"}, "url":"URL#3671186" }, { "@score":"1", "@id":"3671225", "info":{"authors":{"author":[{"@pid":"72/10670","text":"Diego R. Amancio"},{"@pid":"12/11142","text":"Filipi Nascimento Silva"},{"@pid":"76/1098","text":"Luciano da F. Costa"}]},"title":"Concentric network symmetry grasps authors' styles in word adjacency networks.","venue":"CoRR","volume":"abs/1504.02162","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmancioSC15","ee":"http://arxiv.org/abs/1504.02162","url":"https://dblp.org/rec/journals/corr/AmancioSC15"}, "url":"URL#3671225" }, { "@score":"1", "@id":"3671229", "info":{"authors":{"author":[{"@pid":"160/8869","text":"Ana Rita Amaral"},{"@pid":"129/3449","text":"Eugénio Rodrigues"},{"@pid":"129/3474","text":"Adélio Rodrigues Gaspar"},{"@pid":"47/7298","text":"Álvaro Gomes"}]},"title":"A parametric study on window-to-floor ratio of double window glazing and its shadowing using dynamic simulation.","venue":"CoRR","volume":"abs/1504.04174","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmaralRGG15a","ee":"http://arxiv.org/abs/1504.04174","url":"https://dblp.org/rec/journals/corr/AmaralRGG15a"}, "url":"URL#3671229" }, { "@score":"1", "@id":"3671247", "info":{"authors":{"author":[{"@pid":"137/8381","text":"Moreno Ambrosin"},{"@pid":"82/4386","text":"Mauro Conti"},{"@pid":"161/9802","text":"Tooska Dargahi"}]},"title":"On the Feasibility of Attribute-Based Encryption on Smartphone Devices.","venue":"CoRR","volume":"abs/1504.00619","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AmbrosinCD15","ee":"http://arxiv.org/abs/1504.00619","url":"https://dblp.org/rec/journals/corr/AmbrosinCD15"}, "url":"URL#3671247" }, { "@score":"1", "@id":"3671266", "info":{"authors":{"author":[{"@pid":"153/1970","text":"Gholamali Aminian"},{"@pid":"39/7805","text":"Mahtab Mirmohseni"},{"@pid":"25/311","text":"Masoumeh Nasiri-Kenari"},{"@pid":"77/2313","text":"Faramarz Fekri"}]},"title":"On the Capacity of Level and Type Modulation in Molecular Communication with Ligand Receptors.","venue":"CoRR","volume":"abs/1504.04322","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AminianMNF15","ee":"http://arxiv.org/abs/1504.04322","url":"https://dblp.org/rec/journals/corr/AminianMNF15"}, "url":"URL#3671266" }, { "@score":"1", "@id":"3671273", "info":{"authors":{"author":[{"@pid":"147/5158","text":"Amir Aminjavaheri"},{"@pid":"137/0173","text":"Arman Farhang"},{"@pid":"20/4118","text":"Nicola Marchetti"},{"@pid":"d/LindaDoyle","text":"Linda E. Doyle"},{"@pid":"69/3244","text":"Behrouz Farhang-Boroujeny"}]},"title":"Frequency Spreading Equalization in Multicarrier Massive MIMO.","venue":"CoRR","volume":"abs/1504.01140","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AminjavaheriFMD15","ee":"http://arxiv.org/abs/1504.01140","url":"https://dblp.org/rec/journals/corr/AminjavaheriFMD15"}, "url":"URL#3671273" }, { "@score":"1", "@id":"3671305", "info":{"authors":{"author":[{"@pid":"136/5128","text":"Farhad Pourkamali-Anaraki"},{"@pid":"47/9100","text":"Stephen Becker"},{"@pid":"79/5254","text":"Shannon M. Hughes"}]},"title":"Efficient Dictionary Learning via Very Sparse Random Projections.","venue":"CoRR","volume":"abs/1504.01169","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnarakiBH15","ee":"http://arxiv.org/abs/1504.01169","url":"https://dblp.org/rec/journals/corr/AnarakiBH15"}, "url":"URL#3671305" }, { "@score":"1", "@id":"3671308", "info":{"authors":{"author":[{"@pid":"135/6048","text":"Yogesh Anbalagan"},{"@pid":"04/5616","text":"Hao Huang"},{"@pid":"77/4422","text":"Shachar Lovett"},{"@pid":"90/8044","text":"Sergey Norin"},{"@pid":"v/AdrianVetta","text":"Adrian Vetta"},{"@pid":"30/2244","text":"Hehui Wu"}]},"title":"Large Supports are required for Well-Supported Nash Equilibria.","venue":"CoRR","volume":"abs/1504.03602","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnbalaganHLNVW15","ee":"http://arxiv.org/abs/1504.03602","url":"https://dblp.org/rec/journals/corr/AnbalaganHLNVW15"}, "url":"URL#3671308" }, { "@score":"1", "@id":"3671311", "info":{"authors":{"author":[{"@pid":"a/EmmanuelleAnceaume","text":"Emmanuelle Anceaume"},{"@pid":"10/1213","text":"Yann Busnel"},{"@pid":"50/10600","text":"Ernst Schulte-Geers"},{"@pid":"11/4882","text":"Bruno Sericola"}]},"title":"Optimization results for a generalized coupon collector problem.","venue":"CoRR","volume":"abs/1504.03878","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnceaumeBSS15","ee":"http://arxiv.org/abs/1504.03878","url":"https://dblp.org/rec/journals/corr/AnceaumeBSS15"}, "url":"URL#3671311" }, { "@score":"1", "@id":"3671348", "info":{"authors":{"author":[{"@pid":"73/7391","text":"Iryna Andriyanova"},{"@pid":"83/8261","text":"Pablo M. Olmos"}]},"title":"On Distributed Storage Allocations for Memory-Limited Systems.","venue":"CoRR","volume":"abs/1504.04137","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AndriyanovaO15","ee":"http://arxiv.org/abs/1504.04137","url":"https://dblp.org/rec/journals/corr/AndriyanovaO15"}, "url":"URL#3671348" }, { "@score":"1", "@id":"3671355", "info":{"authors":{"author":[{"@pid":"83/2014","text":"Vangelis Angelakis"},{"@pid":"159/2154","text":"Ioannis Avgouleas"},{"@pid":"36/8968","text":"Nikolaos Pappas 0001"},{"@pid":"09/5856-1","text":"Di Yuan 0001"}]},"title":"Flexible Allocation of Heterogeneous Resources to Services on an IoT Device.","venue":"CoRR","volume":"abs/1504.03218","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AngelakisAPY15","ee":"http://arxiv.org/abs/1504.03218","url":"https://dblp.org/rec/journals/corr/AngelakisAPY15"}, "url":"URL#3671355" }, { "@score":"1", "@id":"3671366", "info":{"authors":{"author":{"@pid":"00/4199","text":"Spyros Angelopoulos 0001"}},"title":"Further Connections Between Contract-Scheduling and Ray-Searching Problems.","venue":"CoRR","volume":"abs/1504.07168","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Angelopoulos15","ee":"http://arxiv.org/abs/1504.07168","url":"https://dblp.org/rec/journals/corr/Angelopoulos15"}, "url":"URL#3671366" }, { "@score":"1", "@id":"3671368", "info":{"authors":{"author":[{"@pid":"162/0090","text":"Marko Angjelichinoski"},{"@pid":"84/6001","text":"Cedomir Stefanovic"},{"@pid":"50/3930","text":"Petar Popovski"},{"@pid":"29/10035","text":"Hongpeng Liu"},{"@pid":"65/10729","text":"Poh Chiang Loh"},{"@pid":"87/1024","text":"Frede Blaabjerg"}]},"title":"Power Talk: How to Modulate Data over a DC Micro Grid Bus using Power Electronics.","venue":"CoRR","volume":"abs/1504.03016","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Angjelichinoski15","ee":"http://arxiv.org/abs/1504.03016","url":"https://dblp.org/rec/journals/corr/Angjelichinoski15"}, "url":"URL#3671368" }, { "@score":"1", "@id":"3671379", "info":{"authors":{"author":{"@pid":"84/9280","text":"Muhammad Ali Raza Anjum"}},"title":"A New Approach to Adaptive Signal Processing.","venue":"CoRR","volume":"abs/1504.06054","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Anjum15","ee":"http://arxiv.org/abs/1504.06054","url":"https://dblp.org/rec/journals/corr/Anjum15"}, "url":"URL#3671379" }, { "@score":"1", "@id":"3671380", "info":{"authors":{"author":{"@pid":"84/9280","text":"Muhammad Ali Raza Anjum"}},"title":"A New Approach to Linear Estimation Problem in Multi-user Massive MIMO Systems.","venue":"CoRR","volume":"abs/1504.07426","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Anjum15a","ee":"http://arxiv.org/abs/1504.07426","url":"https://dblp.org/rec/journals/corr/Anjum15a"}, "url":"URL#3671380" }, { "@score":"1", "@id":"3671391", "info":{"authors":{"author":[{"@pid":"161/9801","text":"Ahlam Ansari"},{"@pid":"162/0024","text":"Mohd Amin Sayyed"},{"@pid":"162/0079","text":"Khatija Ratlamwala"},{"@pid":"161/9946","text":"Parvin Shaikh"}]},"title":"An Optimized Hybrid Approach for Path Finding.","venue":"CoRR","volume":"abs/1504.02281","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnsariSRS15","ee":"http://arxiv.org/abs/1504.02281","url":"https://dblp.org/rec/journals/corr/AnsariSRS15"}, "url":"URL#3671391" }, { "@score":"1", "@id":"3671406", "info":{"authors":{"author":[{"@pid":"155/4686","text":"Olugbenga Moses Anubi"},{"@pid":"161/9944","text":"Layne Clemen"}]},"title":"Localization of Control Synthesis Problem for Large-Scale Interconnected System Using IQC and Dissipativity Theories.","venue":"CoRR","volume":"abs/1504.03268","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AnubiC15","ee":"http://arxiv.org/abs/1504.03268","url":"https://dblp.org/rec/journals/corr/AnubiC15"}, "url":"URL#3671406" }, { "@score":"1", "@id":"3671410", "info":{"authors":{"author":[{"@pid":"90/8653","text":"Oisin Mac Aodha"},{"@pid":"24/711","text":"Neill D. F. Campbell"},{"@pid":"48/6214","text":"Jan Kautz"},{"@pid":"41/281","text":"Gabriel J. Brostow"}]},"title":"Hierarchical Subquery Evaluation for Active Learning on a Graph.","venue":"CoRR","volume":"abs/1504.08219","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AodhaCKB15","ee":"http://arxiv.org/abs/1504.08219","url":"https://dblp.org/rec/journals/corr/AodhaCKB15"}, "url":"URL#3671410" }, { "@score":"1", "@id":"3671412", "info":{"authors":{"author":[{"@pid":"61/11344","text":"Pol Mac Aonghusa"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"}]},"title":"Don't let Google know I'm lonely!","venue":"CoRR","volume":"abs/1504.08043","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AonghusaL15","ee":"http://arxiv.org/abs/1504.08043","url":"https://dblp.org/rec/journals/corr/AonghusaL15"}, "url":"URL#3671412" }, { "@score":"1", "@id":"3671439", "info":{"authors":{"author":{"@pid":"98/5718","text":"Ognjen Arandjelovic"}},"title":"Automatic Face Recognition from Video.","venue":"CoRR","volume":"abs/1504.05308","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arandjelovic15","ee":"http://arxiv.org/abs/1504.05308","url":"https://dblp.org/rec/journals/corr/Arandjelovic15"}, "url":"URL#3671439" }, { "@score":"1", "@id":"3671442", "info":{"authors":{"author":[{"@pid":"98/5718","text":"Ognjen Arandjelovic"},{"@pid":"124/2759","text":"Duc-Son Pham 0001"},{"@pid":"81/1984","text":"Svetha Venkatesh"}]},"title":"Viewpoint distortion compensation in practical surveillance systems.","venue":"CoRR","volume":"abs/1504.05298","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArandjelovicPV15","ee":"http://arxiv.org/abs/1504.05298","url":"https://dblp.org/rec/journals/corr/ArandjelovicPV15"}, "url":"URL#3671442" }, { "@score":"1", "@id":"3671443", "info":{"authors":{"author":[{"@pid":"98/5718","text":"Ognjen Arandjelovic"},{"@pid":"124/2759","text":"Duc-Son Pham 0001"},{"@pid":"81/1984","text":"Svetha Venkatesh"}]},"title":"Groupwise registration of aerial images.","venue":"CoRR","volume":"abs/1504.05299","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArandjelovicPV15a","ee":"http://arxiv.org/abs/1504.05299","url":"https://dblp.org/rec/journals/corr/ArandjelovicPV15a"}, "url":"URL#3671443" }, { "@score":"1", "@id":"3671444", "info":{"authors":{"author":[{"@pid":"98/5718","text":"Ognjen Arandjelovic"},{"@pid":"124/2759","text":"Duc-Son Pham 0001"},{"@pid":"81/1984","text":"Svetha Venkatesh"}]},"title":"The adaptable buffer algorithm for high quantile estimation in non-stationary data streams.","venue":"CoRR","volume":"abs/1504.05302","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArandjelovicPV15b","ee":"http://arxiv.org/abs/1504.05302","url":"https://dblp.org/rec/journals/corr/ArandjelovicPV15b"}, "url":"URL#3671444" }, { "@score":"1", "@id":"3671445", "info":{"authors":{"author":[{"@pid":"159/7440","text":"Daniel Aranki"},{"@pid":"b/RuzenaBajcsy","text":"Ruzena Bajcsy"}]},"title":"Private Disclosure of Information in Health Tele-monitoring.","venue":"CoRR","volume":"abs/1504.07313","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArankiB15","ee":"http://arxiv.org/abs/1504.07313","url":"https://dblp.org/rec/journals/corr/ArankiB15"}, "url":"URL#3671445" }, { "@score":"1", "@id":"3671448", "info":{"authors":{"author":[{"@pid":"89/4678","text":"Pantelis-Daniel M. Arapoglou"},{"@pid":"32/9471","text":"Alberto Ginesi"},{"@pid":"49/1848","text":"Stefano Cioni"},{"@pid":"135/2681","text":"Stefan Erl"},{"@pid":"21/11197","text":"Federico Clazzer"},{"@pid":"49/8436","text":"Stefano Andrenacci"},{"@pid":"13/30","text":"Alessandro Vanelli-Coralli"}]},"title":"DVB-S2x Enabled Precoding for High Throughput Satellite Systems.","venue":"CoRR","volume":"abs/1504.03109","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArapoglouGCECAV15","ee":"http://arxiv.org/abs/1504.03109","url":"https://dblp.org/rec/journals/corr/ArapoglouGCECAV15"}, "url":"URL#3671448" }, { "@score":"1", "@id":"3671456", "info":{"authors":{"author":[{"@pid":"126/4739","text":"Fatemeh Arbabjolfaei"},{"@pid":"93/524-1","text":"Young-Han Kim 0001"}]},"title":"On Critical Index Coding Problems.","venue":"CoRR","volume":"abs/1504.06760","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArbabjolfaeiK15","ee":"http://arxiv.org/abs/1504.06760","url":"https://dblp.org/rec/journals/corr/ArbabjolfaeiK15"}, "url":"URL#3671456" }, { "@score":"1", "@id":"3671457", "info":{"authors":{"author":[{"@pid":"126/4739","text":"Fatemeh Arbabjolfaei"},{"@pid":"93/524-1","text":"Young-Han Kim 0001"}]},"title":"Structural Properties of Index Coding Capacity Using Fractional Graph Theory.","venue":"CoRR","volume":"abs/1504.06761","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArbabjolfaeiK15a","ee":"http://arxiv.org/abs/1504.06761","url":"https://dblp.org/rec/journals/corr/ArbabjolfaeiK15a"}, "url":"URL#3671457" }, { "@score":"1", "@id":"3671459", "info":{"authors":{"author":[{"@pid":"132/9372","text":"Youssef Arbach"},{"@pid":"162/0162","text":"David Karcher"},{"@pid":"27/4654","text":"Kirstin Peters"},{"@pid":"n/UweNestmann","text":"Uwe Nestmann"}]},"title":"Dynamic Causality in Event Structures (Technical Report).","venue":"CoRR","volume":"abs/1504.00512","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArbachKPN15","ee":"http://arxiv.org/abs/1504.00512","url":"https://dblp.org/rec/journals/corr/ArbachKPN15"}, "url":"URL#3671459" }, { "@score":"1", "@id":"3671463", "info":{"authors":{"author":[{"@pid":"47/199","text":"Carlos Areces"},{"@pid":"17/5984","text":"Miguel Campercholi"},{"@pid":"162/0174","text":"Daniel Penazzi"},{"@pid":"46/7604","text":"Pedro Sánchez Terraf"}]},"title":"The Lattice of Congruences of a Finite Linear Frame.","venue":"CoRR","volume":"abs/1504.01789","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArecesCPT15","ee":"http://arxiv.org/abs/1504.01789","url":"https://dblp.org/rec/journals/corr/ArecesCPT15"}, "url":"URL#3671463" }, { "@score":"1", "@id":"3671469", "info":{"authors":{"author":[{"@pid":"13/10051","text":"Olfa Arfaoui"},{"@pid":"79/5480","text":"Minyar Sassi Hidri"}]},"title":"Mining Semi-structured Data.","venue":"CoRR","volume":"abs/1504.04031","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArfaouiH15","ee":"http://arxiv.org/abs/1504.04031","url":"https://dblp.org/rec/journals/corr/ArfaouiH15"}, "url":"URL#3671469" }, { "@score":"1", "@id":"3671473", "info":{"authors":{"author":[{"@pid":"145/6522","text":"Reza Arghandeh"},{"@pid":"145/6428","text":"Alexandra von Meier"},{"@pid":"162/0110","text":"Laura Mehrmanesh"},{"@pid":"35/1674","text":"Lamine Mili"}]},"title":"On the Definition of Cyber-Physical Resilience in Power Systems.","venue":"CoRR","volume":"abs/1504.05916","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArghandehMMM15","ee":"http://arxiv.org/abs/1504.05916","url":"https://dblp.org/rec/journals/corr/ArghandehMMM15"}, "url":"URL#3671473" }, { "@score":"1", "@id":"3671483", "info":{"authors":{"author":{"@pid":"58/6450","text":"Erdal Arikan"}},"title":"A Packing Lemma for Polar Codes.","venue":"CoRR","volume":"abs/1504.05793","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arikan15a","ee":"http://arxiv.org/abs/1504.05793","url":"https://dblp.org/rec/journals/corr/Arikan15a"}, "url":"URL#3671483" }, { "@score":"1", "@id":"3671485", "info":{"authors":{"author":[{"@pid":"58/6450","text":"Erdal Arikan"},{"@pid":"49/10799","text":"Najeeb ul Hassan"},{"@pid":"99/1262","text":"Michael Lentmaier"},{"@pid":"30/6618","text":"Guido Montorsi"},{"@pid":"22/1860","text":"Jossy Sayir"}]},"title":"Challenges and some new directions in channel coding.","venue":"CoRR","volume":"abs/1504.03916","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArikanHLMS15","ee":"http://arxiv.org/abs/1504.03916","url":"https://dblp.org/rec/journals/corr/ArikanHLMS15"}, "url":"URL#3671485" }, { "@score":"1", "@id":"3671487", "info":{"authors":{"author":{"@pid":"117/5505","text":"Ryuta Arisaka"}},"title":"Gradual Classical Logic for Attributed Objects - Extended in Re-Presentation.","venue":"CoRR","volume":"abs/1504.04802","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arisaka15","ee":"http://arxiv.org/abs/1504.04802","url":"https://dblp.org/rec/journals/corr/Arisaka15"}, "url":"URL#3671487" }, { "@score":"1", "@id":"3671488", "info":{"authors":{"author":{"@pid":"117/5505","text":"Ryuta Arisaka"}},"title":"How do you revise your belief set with %$;@*?","venue":"CoRR","volume":"abs/1504.05381","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Arisaka15a","ee":"http://arxiv.org/abs/1504.05381","url":"https://dblp.org/rec/journals/corr/Arisaka15a"}, "url":"URL#3671488" }, { "@score":"1", "@id":"3671509", "info":{"authors":{"author":[{"@pid":"138/8057","text":"Nick Arnosti"},{"@pid":"43/3631","text":"Nicole Immorlica"},{"@pid":"09/6191","text":"Brendan Lucier"}]},"title":"The (Non)-Existence of Stable Mechanisms in Incomplete Information Environments.","venue":"CoRR","volume":"abs/1504.03257","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArnostiIL15","ee":"http://arxiv.org/abs/1504.03257","url":"https://dblp.org/rec/journals/corr/ArnostiIL15"}, "url":"URL#3671509" }, { "@score":"1", "@id":"3671511", "info":{"authors":{"author":[{"@pid":"a/BAronov","text":"Boris Aronov"},{"@pid":"h/SarielHarPeled","text":"Sariel Har-Peled"},{"@pid":"k/ChristianKnauer","text":"Christian Knauer"},{"@pid":"28/5745-1","text":"Yusu Wang 0001"},{"@pid":"44/3065","text":"Carola Wenk"}]},"title":"Fréchet Distance for Curves, Revisited.","venue":"CoRR","volume":"abs/1504.07685","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AronovHKWW15","ee":"http://arxiv.org/abs/1504.07685","url":"https://dblp.org/rec/journals/corr/AronovHKWW15"}, "url":"URL#3671511" }, { "@score":"1", "@id":"3671514", "info":{"authors":{"author":[{"@pid":"43/521","text":"Vipul Arora 0001"},{"@pid":"14/1412","text":"Laxmidhar Behera"},{"@pid":"138/6143","text":"Ajay Pratap Yadav"}]},"title":"Optimal Convergence Rate in Feed Forward Neural Networks using HJB Equation.","venue":"CoRR","volume":"abs/1504.07278","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AroraBY15","ee":"http://arxiv.org/abs/1504.07278","url":"https://dblp.org/rec/journals/corr/AroraBY15"}, "url":"URL#3671514" }, { "@score":"1", "@id":"3671543", "info":{"authors":{"author":[{"@pid":"143/5142","text":"Martijn Arts"},{"@pid":"97/10805","text":"Andreas Bollig"},{"@pid":"m/RMathar","text":"Rudolf Mathar"}]},"title":"Quickest Eigenvalue-Based Spectrum Sensing using Random Matrix Theory.","venue":"CoRR","volume":"abs/1504.01628","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ArtsBM15","ee":"http://arxiv.org/abs/1504.01628","url":"https://dblp.org/rec/journals/corr/ArtsBM15"}, "url":"URL#3671543" }, { "@score":"1", "@id":"3671552", "info":{"authors":{"author":[{"@pid":"140/7195","text":"Behzad Asadi"},{"@pid":"04/6981","text":"Lawrence Ong"},{"@pid":"148/3679-1","text":"Sarah J. Johnson"}]},"title":"A Unified Scheme for Two-Receiver Broadcast Channels with Receiver Message Side Information.","venue":"CoRR","volume":"abs/1504.00082","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AsadiOJ15","ee":"http://arxiv.org/abs/1504.00082","url":"https://dblp.org/rec/journals/corr/AsadiOJ15"}, "url":"URL#3671552" }, { "@score":"1", "@id":"3671555", "info":{"authors":{"author":[{"@pid":"54/3056","text":"Tsvetan Asamov"},{"@pid":"80/4808","text":"Adi Ben-Israel"}]},"title":"An ℓ1-Method for Clustering High-Dimensional Data.","venue":"CoRR","volume":"abs/1504.01294","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AsamovB15","ee":"http://arxiv.org/abs/1504.01294","url":"https://dblp.org/rec/journals/corr/AsamovB15"}, "url":"URL#3671555" }, { "@score":"1", "@id":"3671567", "info":{"authors":{"author":[{"@pid":"120/8961","text":"Mohammad Ashraf"},{"@pid":"156/7854","text":"Ghulam Mohammad"}]},"title":"On skew cyclic codes over $F_q+vF_q+v2F_q$.","venue":"CoRR","volume":"abs/1504.04326","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AshrafM15","ee":"http://arxiv.org/abs/1504.04326","url":"https://dblp.org/rec/journals/corr/AshrafM15"}, "url":"URL#3671567" }, { "@score":"1", "@id":"3671568", "info":{"authors":{"author":[{"@pid":"120/8961","text":"Mohammad Ashraf"},{"@pid":"156/7854","text":"Ghulam Mohammad"}]},"title":"$(1+2u)$-constacyclic codes over $\\mathbb{Z}_4+u\\mathbb{Z}_4$.","venue":"CoRR","volume":"abs/1504.03445","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AshrafM15a","ee":"http://arxiv.org/abs/1504.03445","url":"https://dblp.org/rec/journals/corr/AshrafM15a"}, "url":"URL#3671568" }, { "@score":"1", "@id":"3671589", "info":{"authors":{"author":{"@pid":"02/6104-2","text":"Ali Assaf 0002"}},"title":"Conservativity of embeddings in the lambda Pi calculus modulo rewriting (long version).","venue":"CoRR","volume":"abs/1504.05038","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Assaf15","ee":"http://arxiv.org/abs/1504.05038","url":"https://dblp.org/rec/journals/corr/Assaf15"}, "url":"URL#3671589" }, { "@score":"1", "@id":"3671592", "info":{"authors":{"author":{"@pid":"66/2150","text":"Marcos Dias de Assunção"}},"title":"Enhanced Red-Black-Tree Data Structure for Facilitating the Scheduling of Reservations.","venue":"CoRR","volume":"abs/1504.00785","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Assuncao15","ee":"http://arxiv.org/abs/1504.00785","url":"https://dblp.org/rec/journals/corr/Assuncao15"}, "url":"URL#3671592" }, { "@score":"1", "@id":"3671602", "info":{"authors":{"author":[{"@pid":"01/11270","text":"Mohammad R. Ataei"},{"@pid":"36/2813","text":"Amir H. Banihashemi"},{"@pid":"k/ThomasKunz","text":"Thomas Kunz"}]},"title":"Energy-Efficient Broadcasting for Cross Wireless Ad-Hoc Networks.","venue":"CoRR","volume":"abs/1504.05268","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AtaeiBK15","ee":"http://arxiv.org/abs/1504.05268","url":"https://dblp.org/rec/journals/corr/AtaeiBK15"}, "url":"URL#3671602" }, { "@score":"1", "@id":"3671627", "info":{"authors":{"author":[{"@pid":"130/0864","text":"Italo Atzeni"},{"@pid":"90/3967","text":"Marios Kountouris"}]},"title":"Full-Duplex MIMO Small-Cell Networks: Performance Analysis.","venue":"CoRR","volume":"abs/1504.04167","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AtzeniK15","ee":"http://arxiv.org/abs/1504.04167","url":"https://dblp.org/rec/journals/corr/AtzeniK15"}, "url":"URL#3671627" }, { "@score":"1", "@id":"3671629", "info":{"authors":{"author":[{"@pid":"88/11466","text":"Céline Aubel"},{"@pid":"97/4598","text":"Helmut Bölcskei"}]},"title":"Density Criteria for the Identification of Linear Time-Varying Systems.","venue":"CoRR","volume":"abs/1504.05036","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AubelB15","ee":"http://arxiv.org/abs/1504.05036","url":"https://dblp.org/rec/journals/corr/AubelB15"}, "url":"URL#3671629" }, { "@score":"1", "@id":"3671648", "info":{"authors":{"author":[{"@pid":"21/1998","text":"Marco Autili"},{"@pid":"c/VittorioCortellessa","text":"Vittorio Cortellessa"},{"@pid":"44/1899","text":"Paolo Di Benedetto"},{"@pid":"i/PaolaInverardi","text":"Paola Inverardi"}]},"title":"On the adaptation of context-aware services.","venue":"CoRR","volume":"abs/1504.07558","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AutiliCBI15","ee":"http://arxiv.org/abs/1504.07558","url":"https://dblp.org/rec/journals/corr/AutiliCBI15"}, "url":"URL#3671648" }, { "@score":"1", "@id":"3671649", "info":{"authors":{"author":[{"@pid":"21/1998","text":"Marco Autili"},{"@pid":"i/PaolaInverardi","text":"Paola Inverardi"},{"@pid":"t/MassimoTivoli","text":"Massimo Tivoli"}]},"title":"Synthesis of correct adaptors for protocol enhancement in component-based systems.","venue":"CoRR","volume":"abs/1504.07504","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AutiliIT15","ee":"http://arxiv.org/abs/1504.07504","url":"https://dblp.org/rec/journals/corr/AutiliIT15"}, "url":"URL#3671649" }, { "@score":"1", "@id":"3671671", "info":{"authors":{"author":[{"@pid":"07/11045","text":"Orly Avner"},{"@pid":"20/1669","text":"Shie Mannor"}]},"title":"Learning to coordinate without communication in multi-user multi-armed bandit problems.","venue":"CoRR","volume":"abs/1504.08167","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/AvnerM15","ee":"http://arxiv.org/abs/1504.08167","url":"https://dblp.org/rec/journals/corr/AvnerM15"}, "url":"URL#3671671" }, { "@score":"1", "@id":"3671737", "info":{"authors":{"author":[{"@pid":"06/9367","text":"Parisa Babaheidarian"},{"@pid":"34/6656","text":"Somayeh Salimi"}]},"title":"Compute-and-Forward Can Buy Secrecy Cheap.","venue":"CoRR","volume":"abs/1504.05862","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabaheidarianS15","ee":"http://arxiv.org/abs/1504.05862","url":"https://dblp.org/rec/journals/corr/BabaheidarianS15"}, "url":"URL#3671737" }, { "@score":"1", "@id":"3671748", "info":{"authors":{"author":[{"@pid":"24/9830","text":"Yakov Babichenko"},{"@pid":"p/CHPapadimitriou","text":"Christos H. Papadimitriou"},{"@pid":"11/10308","text":"Aviad Rubinstein"}]},"title":"Can Almost Everybody be Almost Happy? PCP for PPAD and the Inapproximability of Nash.","venue":"CoRR","volume":"abs/1504.02411","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabichenkoPR15","ee":"http://arxiv.org/abs/1504.02411","url":"https://dblp.org/rec/journals/corr/BabichenkoPR15"}, "url":"URL#3671748" }, { "@score":"1", "@id":"3671749", "info":{"authors":{"author":[{"@pid":"10/7977","text":"Mikhail A. Babin"},{"@pid":"51/2300","text":"Sergei O. Kuznetsov"}]},"title":"Dualization in Lattices Given by Ordered Sets of Irreducibles.","venue":"CoRR","volume":"abs/1504.01145","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BabinK15","ee":"http://arxiv.org/abs/1504.01145","url":"https://dblp.org/rec/journals/corr/BabinK15"}, "url":"URL#3671749" }, { "@score":"1", "@id":"3671753", "info":{"authors":{"author":[{"@pid":"03/5744","text":"Giacomo Bacci"},{"@pid":"48/1437","text":"Luca Sanguinetti"},{"@pid":"38/5578","text":"Marco Luise"}]},"title":"Understanding Game Theory via Wireless Power Control.","venue":"CoRR","volume":"abs/1504.06607","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BacciSL15","ee":"http://arxiv.org/abs/1504.06607","url":"https://dblp.org/rec/journals/corr/BacciSL15"}, "url":"URL#3671753" }, { "@score":"1", "@id":"3671766", "info":{"authors":{"author":[{"@pid":"19/11199","text":"Spencer Backman"},{"@pid":"80/10248","text":"Tony Huynh"}]},"title":"Transfinite Ford-Fulkerson on a Finite Network.","venue":"CoRR","volume":"abs/1504.04363","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BackmanH15","ee":"http://arxiv.org/abs/1504.04363","url":"https://dblp.org/rec/journals/corr/BackmanH15"}, "url":"URL#3671766" }, { "@score":"1", "@id":"3671768", "info":{"authors":{"author":[{"@pid":"74/10669","text":"Arturs Backurs"},{"@pid":"i/PiotrIndyk","text":"Piotr Indyk"},{"@pid":"40/674","text":"Eric Price 0001"},{"@pid":"10/7611","text":"Ilya P. Razenshteyn"},{"@pid":"w/DPWoodruff","text":"David P. Woodruff"}]},"title":"Nearly-optimal bounds for sparse recovery in generic norms, with applications to $k$-median sketching.","venue":"CoRR","volume":"abs/1504.01076","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BackursIPRW15","ee":"http://arxiv.org/abs/1504.01076","url":"https://dblp.org/rec/journals/corr/BackursIPRW15"}, "url":"URL#3671768" }, { "@score":"1", "@id":"3671784", "info":{"authors":{"author":[{"@pid":"58/5271","text":"David Baelde"},{"@pid":"67/5099","text":"Stéphanie Delaune"},{"@pid":"140/7281","text":"Lucca Hirschi"}]},"title":"Partial Order Reduction for Security Protocols.","venue":"CoRR","volume":"abs/1504.04768","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaeldeDH15","ee":"http://arxiv.org/abs/1504.04768","url":"https://dblp.org/rec/journals/corr/BaeldeDH15"}, "url":"URL#3671784" }, { "@score":"1", "@id":"3671792", "info":{"authors":{"author":[{"@pid":"20/6834","text":"Jean-François Baget"},{"@pid":"80/28","text":"Meghyn Bienvenu"},{"@pid":"10/88","text":"Marie-Laure Mugnier"},{"@pid":"132/2824","text":"Swan Rocher"}]},"title":"Combining Existential Rules and Transitivity: Next Steps.","venue":"CoRR","volume":"abs/1504.07443","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BagetBMR15","ee":"http://arxiv.org/abs/1504.07443","url":"https://dblp.org/rec/journals/corr/BagetBMR15"}, "url":"URL#3671792" }, { "@score":"1", "@id":"3671795", "info":{"authors":{"author":[{"@pid":"161/9866","text":"Sina S. Baghsorkhi"},{"@pid":"161/9938","text":"Sergey P. Suetin"}]},"title":"Embedding AC Power Flow with Voltage Control in the Complex Plane : The Case of Analytic Continuation via Padé Approximants.","venue":"CoRR","volume":"abs/1504.03249","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaghsorkhiS15","ee":"http://arxiv.org/abs/1504.03249","url":"https://dblp.org/rec/journals/corr/BaghsorkhiS15"}, "url":"URL#3671795" }, { "@score":"1", "@id":"3671799", "info":{"authors":{"author":[{"@pid":"122/2946","text":"Adel A. Bahaddad"},{"@pid":"64/10643","text":"Rayed AlGhamdi"},{"@pid":"122/2897","text":"Salem Alkhalaf"}]},"title":"Adoption Factors for e-Malls in the SME Sector in Saudi Arabia.","venue":"CoRR","volume":"abs/1504.01112","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BahaddadAA15","ee":"http://arxiv.org/abs/1504.01112","url":"https://dblp.org/rec/journals/corr/BahaddadAA15"}, "url":"URL#3671799" }, { "@score":"1", "@id":"3671826", "info":{"authors":{"author":[{"@pid":"36/2915","text":"John Baillieul"},{"@pid":"85/7433-1","text":"Bowen Zhang 0001"},{"@pid":"42/1503-29","text":"Shuai Wang 0029"}]},"title":"The Kirchhoff-Braess Paradox and Its Implications for Smart Microgrids.","venue":"CoRR","volume":"abs/1504.04319","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaillieulZW15","ee":"http://arxiv.org/abs/1504.04319","url":"https://dblp.org/rec/journals/corr/BaillieulZW15"}, "url":"URL#3671826" }, { "@score":"1", "@id":"3671833", "info":{"authors":{"author":[{"@pid":"96/8129","text":"Dragana Bajovic"},{"@pid":"m/JMFMoura","text":"José M. F. Moura"},{"@pid":"87/4027","text":"João M. F. Xavier"},{"@pid":"53/2290","text":"Bruno Sinopoli"}]},"title":"Distributed inference over directed networks: Performance limits and optimal design.","venue":"CoRR","volume":"abs/1504.07526","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BajovicMXS15","ee":"http://arxiv.org/abs/1504.07526","url":"https://dblp.org/rec/journals/corr/BajovicMXS15"}, "url":"URL#3671833" }, { "@score":"1", "@id":"3671839", "info":{"authors":{"author":[{"@pid":"161/9958","text":"Amir H. Bakhtiary"},{"@pid":"80/2887","text":"Àgata Lapedriza"},{"@pid":"08/4919","text":"David Masip"}]},"title":"Speeding Up Neural Networks for Large Scale Classification using WTA Hashing.","venue":"CoRR","volume":"abs/1504.07488","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BakhtiaryLM15","ee":"http://arxiv.org/abs/1504.07488","url":"https://dblp.org/rec/journals/corr/BakhtiaryLM15"}, "url":"URL#3671839" }, { "@score":"1", "@id":"3671842", "info":{"authors":{"author":[{"@pid":"130/3712","text":"R. D. Balaji"},{"@pid":"161/9875","text":"Fatma Al-Mahri"},{"@pid":"161/9789","text":"Tarek Al-Fatnaasi"}]},"title":"Social Impact of MOOC's in Oman Higher Education.","venue":"CoRR","volume":"abs/1504.01861","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalajiAA15","ee":"http://arxiv.org/abs/1504.01861","url":"https://dblp.org/rec/journals/corr/BalajiAA15"}, "url":"URL#3671842" }, { "@score":"1", "@id":"3671846", "info":{"authors":{"author":[{"@pid":"130/3712","text":"R. D. Balaji"},{"@pid":"130/3819","text":"Ramkumar Lakshminarayanan"},{"@pid":"130/3889","text":"Malathi Balaji"}]},"title":"Revolutionary Hybrid E-Books for Enhanced Higher Learning.","venue":"CoRR","volume":"abs/1504.02092","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalajiLB15","ee":"http://arxiv.org/abs/1504.02092","url":"https://dblp.org/rec/journals/corr/BalajiLB15"}, "url":"URL#3671846" }, { "@score":"1", "@id":"3671847", "info":{"authors":{"author":[{"@pid":"130/3712","text":"R. D. Balaji"},{"@pid":"162/0115","text":"V. Veeramani"},{"@pid":"130/3889","text":"Malathi Balaji"}]},"title":"Math Marvel with M-Learning.","venue":"CoRR","volume":"abs/1504.01855","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalajiVB15","ee":"http://arxiv.org/abs/1504.01855","url":"https://dblp.org/rec/journals/corr/BalajiVB15"}, "url":"URL#3671847" }, { "@score":"1", "@id":"3671856", "info":{"authors":{"author":{"@pid":"b/JoseLBalcazar","text":"José L. Balcázar"}},"title":"Quantitative Redundancy in Partial Implications.","venue":"CoRR","volume":"abs/1504.03620","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Balcazar15","ee":"http://arxiv.org/abs/1504.03620","url":"https://dblp.org/rec/journals/corr/Balcazar15"}, "url":"URL#3671856" }, { "@score":"1", "@id":"3671866", "info":{"authors":{"author":[{"@pid":"123/7824","text":"Ayca Balkan"},{"@pid":"v/MosheYVardi","text":"Moshe Y. Vardi"},{"@pid":"43/2753","text":"Paulo Tabuada"}]},"title":"Controller Synthesis for Mode-Target Games.","venue":"CoRR","volume":"abs/1504.07702","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BalkanVT15","ee":"http://arxiv.org/abs/1504.07702","url":"https://dblp.org/rec/journals/corr/BalkanVT15"}, "url":"URL#3671866" }, { "@score":"1", "@id":"3671890", "info":{"authors":{"author":[{"@pid":"162/0210","text":"Michael Baltaxe"},{"@pid":"60/6290","text":"Peter Meer"},{"@pid":"35/6182","text":"Michael Lindenbaum"}]},"title":"Local Variation as a Statistical Hypothesis Test.","venue":"CoRR","volume":"abs/1504.06507","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaltaxeML15","ee":"http://arxiv.org/abs/1504.06507","url":"https://dblp.org/rec/journals/corr/BaltaxeML15"}, "url":"URL#3671890" }, { "@score":"1", "@id":"3671899", "info":{"authors":{"author":[{"@pid":"17/6547","text":"Krzysztof Banas"},{"@pid":"04/8297","text":"Filip Kruzel"},{"@pid":"161/9873","text":"Jan Bielanski"}]},"title":"Finite element numerical integration for first order approximations on multi-core architectures.","venue":"CoRR","volume":"abs/1504.01023","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanasKB15","ee":"http://arxiv.org/abs/1504.01023","url":"https://dblp.org/rec/journals/corr/BanasKB15"}, "url":"URL#3671899" }, { "@score":"1", "@id":"3671902", "info":{"authors":{"author":{"@pid":"99/11266","text":"Afonso S. Bandeira"}},"title":"Random Laplacian matrices and convex relaxations.","venue":"CoRR","volume":"abs/1504.03987","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bandeira15","ee":"http://arxiv.org/abs/1504.03987","url":"https://dblp.org/rec/journals/corr/Bandeira15"}, "url":"URL#3671902" }, { "@score":"1", "@id":"3671905", "info":{"authors":{"author":[{"@pid":"99/11266","text":"Afonso S. Bandeira"},{"@pid":"162/0105","text":"Megan E. Lewis"},{"@pid":"87/8147","text":"Dustin G. Mixon"}]},"title":"Discrete uncertainty principles and sparse signal processing.","venue":"CoRR","volume":"abs/1504.01014","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BandeiraLM15","ee":"http://arxiv.org/abs/1504.01014","url":"https://dblp.org/rec/journals/corr/BandeiraLM15"}, "url":"URL#3671905" }, { "@score":"1", "@id":"3671917", "info":{"authors":{"author":[{"@pid":"159/1867","text":"Pradeep Kr. Banerjee"},{"@pid":"54/686","text":"Nirmal B. Chakrabarti"}]},"title":"Noise Sensitivity of Teager-Kaiser Energy Operators and Their Ratios.","venue":"CoRR","volume":"abs/1504.08177","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BanerjeeC15","ee":"http://arxiv.org/abs/1504.08177","url":"https://dblp.org/rec/journals/corr/BanerjeeC15"}, "url":"URL#3671917" }, { "@score":"1", "@id":"3671938", "info":{"authors":{"author":[{"@pid":"69/5601","text":"Nikhil Bansal 0001"},{"@pid":"27/2931","text":"Anupam Gupta 0001"},{"@pid":"153/2209","text":"Guru Guruganesh"}]},"title":"On the Lovász Theta function for Independent Sets in Sparse Graphs.","venue":"CoRR","volume":"abs/1504.04767","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BansalGG15","ee":"http://arxiv.org/abs/1504.04767","url":"https://dblp.org/rec/journals/corr/BansalGG15"}, "url":"URL#3671938" }, { "@score":"1", "@id":"3671943", "info":{"authors":{"author":[{"@pid":"148/7044","text":"Aayush Bansal"},{"@pid":"65/10572","text":"Abhinav Shrivastava"},{"@pid":"12/8654","text":"Carl Doersch"},{"@pid":"36/7024-1","text":"Abhinav Gupta 0001"}]},"title":"Mid-level Elements for Object Detection.","venue":"CoRR","volume":"abs/1504.07284","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BansalSDG15","ee":"http://arxiv.org/abs/1504.07284","url":"https://dblp.org/rec/journals/corr/BansalSDG15"}, "url":"URL#3671943" }, { "@score":"1", "@id":"3671948", "info":{"authors":{"author":[{"@pid":"162/0081","text":"Chengqiang Bao"},{"@pid":"154/6306","text":"Liangtian He"},{"@pid":"80/7412","text":"Yilun Wang"}]},"title":"Linear Spatial Pyramid Matching Using Non-convex and non-negative Sparse Coding for Image Classification.","venue":"CoRR","volume":"abs/1504.06897","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BaoHW15","ee":"http://arxiv.org/abs/1504.06897","url":"https://dblp.org/rec/journals/corr/BaoHW15"}, "url":"URL#3671948" }, { "@score":"1", "@id":"3671953", "info":{"authors":{"author":[{"@pid":"120/7601","text":"Victor Bapst"},{"@pid":"63/522","text":"Amin Coja-Oghlan"}]},"title":"Harnessing the Bethe free energy.","venue":"CoRR","volume":"abs/1504.03975","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BapstC15","ee":"http://arxiv.org/abs/1504.03975","url":"https://dblp.org/rec/journals/corr/BapstC15"}, "url":"URL#3671953" }, { "@score":"1", "@id":"3671973", "info":{"authors":{"author":[{"@pid":"56/5867","text":"Jérémy Barbay"},{"@pid":"78/7298","text":"Pablo Pérez-Lantero"}]},"title":"Adaptive Computation of the Swap-Insert Edition Distance.","venue":"CoRR","volume":"abs/1504.07298","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarbayP15","ee":"http://arxiv.org/abs/1504.07298","url":"https://dblp.org/rec/journals/corr/BarbayP15"}, "url":"URL#3671973" }, { "@score":"1", "@id":"3672006", "info":{"authors":{"author":[{"@pid":"63/478","text":"Siddharth Barman"},{"@pid":"76/3876","text":"Katrina Ligett"}]},"title":"Finding Any Nontrivial Coarse Correlated Equilibrium Is Hard.","venue":"CoRR","volume":"abs/1504.06314","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarmanL15","ee":"http://arxiv.org/abs/1504.06314","url":"https://dblp.org/rec/journals/corr/BarmanL15"}, "url":"URL#3672006" }, { "@score":"1", "@id":"3672008", "info":{"authors":{"author":[{"@pid":"56/5500","text":"George Barmpalias"},{"@pid":"09/1993","text":"Richard Elwes"},{"@pid":"126/5207","text":"Andy Lewis-Pye"}]},"title":"From randomness to order: unperturbed Schelling segregation in two or three dimensions.","venue":"CoRR","volume":"abs/1504.03809","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarmpaliasEL15","ee":"http://arxiv.org/abs/1504.03809","url":"https://dblp.org/rec/journals/corr/BarmpaliasEL15"}, "url":"URL#3672008" }, { "@score":"1", "@id":"3672023", "info":{"authors":{"author":[{"@pid":"144/7336","text":"Amaro Barreal"},{"@pid":"06/716","text":"Camilla Hollanti"},{"@pid":"58/1744","text":"Nadya Markin"}]},"title":"Constructions of Fast-Decodable Distributed Space-Time Codes.","venue":"CoRR","volume":"abs/1504.05058","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarrealHM15","ee":"http://arxiv.org/abs/1504.05058","url":"https://dblp.org/rec/journals/corr/BarrealHM15"}, "url":"URL#3672023" }, { "@score":"1", "@id":"3672024", "info":{"authors":{"author":[{"@pid":"144/7336","text":"Amaro Barreal"},{"@pid":"135/6211","text":"Joonas Pääkkönen"},{"@pid":"127/6902","text":"David A. Karpuk"},{"@pid":"06/716","text":"Camilla Hollanti"},{"@pid":"54/306","text":"Olav Tirkkonen"}]},"title":"A Low-Complexity Message Recovery Method for Compute-and-Forward Relaying.","venue":"CoRR","volume":"abs/1504.03182","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BarrealPKHT15","ee":"http://arxiv.org/abs/1504.03182","url":"https://dblp.org/rec/journals/corr/BarrealPKHT15"}, "url":"URL#3672024" }, { "@score":"1", "@id":"3672055", "info":{"authors":{"author":[{"@pid":"04/9777","text":"Hannes Bartz"},{"@pid":"18/3598","text":"Vladimir Sidorenko"}]},"title":"List and Probabilistic Unique Decoding of Folded Subspace Codes.","venue":"CoRR","volume":"abs/1504.05349","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BartzS15","ee":"http://arxiv.org/abs/1504.05349","url":"https://dblp.org/rec/journals/corr/BartzS15"}, "url":"URL#3672055" }, { "@score":"1", "@id":"3672062", "info":{"authors":{"author":[{"@pid":"b/TamerBasar","text":"Tamer Basar"},{"@pid":"143/5988","text":"Seyed Rasoul Etesami"},{"@pid":"21/4206","text":"Alex Olshevsky"}]},"title":"Fast Convergence of Quantized Consensus Using Metropolis Chains Over Static and Dynamic Networks.","venue":"CoRR","volume":"abs/1504.01438","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasarEO15","ee":"http://arxiv.org/abs/1504.01438","url":"https://dblp.org/rec/journals/corr/BasarEO15"}, "url":"URL#3672062" }, { "@score":"1", "@id":"3672070", "info":{"authors":{"author":[{"@pid":"146/7819","text":"Noman Bashir"},{"@pid":"146/7852","text":"Zohaib Sharani"},{"@pid":"146/7851","text":"Khushboo Qayyum"},{"@pid":"80/3447","text":"Affan A. Syed"}]},"title":"Enabling Practical Demand Response in Highly-Stressed Grids using Aashiyana.","venue":"CoRR","volume":"abs/1504.06975","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BashirSQS15","ee":"http://arxiv.org/abs/1504.06975","url":"https://dblp.org/rec/journals/corr/BashirSQS15"}, "url":"URL#3672070" }, { "@score":"1", "@id":"3672072", "info":{"authors":{"author":[{"@pid":"149/0099","text":"Shahab Basiri"},{"@pid":"05/2184","text":"Esa Ollila"},{"@pid":"k/VisaKoivunen","text":"Visa Koivunen"}]},"title":"Robust, scalable and fast bootstrap method for analyzing large scale data.","venue":"CoRR","volume":"abs/1504.02382","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasiriOK15","ee":"http://arxiv.org/abs/1504.02382","url":"https://dblp.org/rec/journals/corr/BasiriOK15"}, "url":"URL#3672072" }, { "@score":"1", "@id":"3672076", "info":{"authors":{"author":[{"@pid":"88/8656","text":"Raef Bassily"},{"@pid":"04/5072","text":"Adam D. Smith"}]},"title":"Local, Private, Efficient Protocols for Succinct Histograms.","venue":"CoRR","volume":"abs/1504.04686","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BassilyS15","ee":"http://arxiv.org/abs/1504.04686","url":"https://dblp.org/rec/journals/corr/BassilyS15"}, "url":"URL#3672076" }, { "@score":"1", "@id":"3672080", "info":{"authors":{"author":[{"@pid":"b/HannahBast","text":"Hannah Bast"},{"@pid":"10/5981","text":"Daniel Delling"},{"@pid":"g/AndrewVGoldberg","text":"Andrew V. Goldberg"},{"@pid":"37/5076","text":"Matthias Müller-Hannemann"},{"@pid":"99/5937","text":"Thomas Pajor"},{"@pid":"s/PeterSanders","text":"Peter Sanders 0001"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"},{"@pid":"63/3747","text":"Renato F. Werneck"}]},"title":"Route Planning in Transportation Networks.","venue":"CoRR","volume":"abs/1504.05140","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BastDGMPSWW15","ee":"http://arxiv.org/abs/1504.05140","url":"https://dblp.org/rec/journals/corr/BastDGMPSWW15"}, "url":"URL#3672080" }, { "@score":"1", "@id":"3672081", "info":{"authors":{"author":[{"@pid":"139/0927","text":"Julien Baste"},{"@pid":"62/1933","text":"Luérbio Faria"},{"@pid":"79/3504","text":"Sulamita Klein"},{"@pid":"14/1657","text":"Ignasi Sau"}]},"title":"Parameterized complexity dichotomy for (r, ℓ)-Vertex Deletion.","venue":"CoRR","volume":"abs/1504.05515","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BasteFKS15","ee":"http://arxiv.org/abs/1504.05515","url":"https://dblp.org/rec/journals/corr/BasteFKS15"}, "url":"URL#3672081" }, { "@score":"1", "@id":"3672110", "info":{"authors":{"author":[{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"09/3487","text":"Pietro Tesi"}]},"title":"Detecting Topology Variations in Dynamical Networks.","venue":"CoRR","volume":"abs/1504.04122","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BattistelliT15","ee":"http://arxiv.org/abs/1504.04122","url":"https://dblp.org/rec/journals/corr/BattistelliT15"}, "url":"URL#3672110" }, { "@score":"1", "@id":"3672111", "info":{"authors":{"author":[{"@pid":"89/1512","text":"Giorgio Battistelli"},{"@pid":"09/3487","text":"Pietro Tesi"}]},"title":"Switching Control for Parameter Identifiability of Uncertain Systems.","venue":"CoRR","volume":"abs/1504.04123","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BattistelliT15a","ee":"http://arxiv.org/abs/1504.04123","url":"https://dblp.org/rec/journals/corr/BattistelliT15a"}, "url":"URL#3672111" }, { "@score":"1", "@id":"3672123", "info":{"authors":{"author":[{"@pid":"149/2560","text":"Johann Bauer"},{"@pid":"18/5038","text":"Loet Leydesdorff"},{"@pid":"09/5112","text":"Lutz Bornmann"}]},"title":"Highly-cited papers in Library and Information Science (LIS): Authors, institutions, and network structures.","venue":"CoRR","volume":"abs/1504.02576","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BauerLB15","ee":"http://arxiv.org/abs/1504.02576","url":"https://dblp.org/rec/journals/corr/BauerLB15"}, "url":"URL#3672123" }, { "@score":"1", "@id":"3672134", "info":{"authors":{"author":{"@pid":"66/6750","text":"Eric Bax"}},"title":"Improved Error Bounds Based on Worst Likely Assignments.","venue":"CoRR","volume":"abs/1504.00052","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bax15","ee":"http://arxiv.org/abs/1504.00052","url":"https://dblp.org/rec/journals/corr/Bax15"}, "url":"URL#3672134" }, { "@score":"1", "@id":"3672158", "info":{"authors":{"author":[{"@pid":"07/10661","text":"Jonathan C. Beard"},{"@pid":"12/2696","text":"Roger D. Chamberlain"}]},"title":"Run Time Approximation of Non-blocking Service Rates for Streaming Systems.","venue":"CoRR","volume":"abs/1504.00591","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeardC15","ee":"http://arxiv.org/abs/1504.00591","url":"https://dblp.org/rec/journals/corr/BeardC15"}, "url":"URL#3672158" }, { "@score":"1", "@id":"3672188", "info":{"authors":{"author":[{"@pid":"161/9828","text":"Bahram Behzadian"},{"@pid":"123/5184","text":"Pratik Agarwal"},{"@pid":"b/WolframBurgard","text":"Wolfram Burgard"},{"@pid":"91/2806","text":"Gian Diego Tipaldi"}]},"title":"Monte Carlo Localization in Hand-Drawn Maps.","venue":"CoRR","volume":"abs/1504.00522","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BehzadianABT15","ee":"http://arxiv.org/abs/1504.00522","url":"https://dblp.org/rec/journals/corr/BehzadianABT15"}, "url":"URL#3672188" }, { "@score":"1", "@id":"3672192", "info":{"authors":{"author":[{"@pid":"71/4661","text":"Salman Beigi"},{"@pid":"55/2101","text":"Nilanjana Datta"},{"@pid":"156/2047","text":"Felix Leditzky"}]},"title":"Decoding quantum information via the Petz recovery map.","venue":"CoRR","volume":"abs/1504.04449","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeigiDL15","ee":"http://arxiv.org/abs/1504.04449","url":"https://dblp.org/rec/journals/corr/BeigiDL15"}, "url":"URL#3672192" }, { "@score":"1", "@id":"3672219", "info":{"authors":{"author":[{"@pid":"162/0062","text":"Soufiane Belharbi"},{"@pid":"c/ClementChatelain","text":"Clément Chatelain 0001"},{"@pid":"45/5213","text":"Romain Hérault"},{"@pid":"03/6714","text":"Sébastien Adam"}]},"title":"Input/Output Deep Architecture for Structured Output Problems.","venue":"CoRR","volume":"abs/1504.07550","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BelharbiCHA15","ee":"http://arxiv.org/abs/1504.07550","url":"https://dblp.org/rec/journals/corr/BelharbiCHA15"}, "url":"URL#3672219" }, { "@score":"1", "@id":"3672244", "info":{"authors":{"author":[{"@pid":"b/AMBenAmram","text":"Amir M. Ben-Amram"},{"@pid":"24/2865","text":"Samir Genaim"}]},"title":"Complexity of Bradley-Manna-Sipma Lexicographic Ranking Functions.","venue":"CoRR","volume":"abs/1504.05018","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ben-AmramG15","ee":"http://arxiv.org/abs/1504.05018","url":"https://dblp.org/rec/journals/corr/Ben-AmramG15"}, "url":"URL#3672244" }, { "@score":"1", "@id":"3672253", "info":{"authors":{"author":[{"@pid":"55/8844","text":"Achraf Ben-Hamadou"},{"@pid":"53/6760","text":"Charles Soussen"},{"@pid":"23/2152","text":"Walter Blondel"},{"@pid":"50/986","text":"Christian Daul"},{"@pid":"69/3318","text":"Didier Wolf"}]},"title":"Comparative study of image registration techniques for bladder video-endoscopy.","venue":"CoRR","volume":"abs/1504.07901","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ben-HamadouSBDW15","ee":"http://arxiv.org/abs/1504.07901","url":"https://dblp.org/rec/journals/corr/Ben-HamadouSBDW15"}, "url":"URL#3672253" }, { "@score":"1", "@id":"3672267", "info":{"authors":{"author":[{"@pid":"53/5909","text":"Josh Benaloh"},{"@pid":"r/RonaldLRivest","text":"Ronald L. Rivest"},{"@pid":"r/PeterYARyan","text":"Peter Y. A. Ryan"},{"@pid":"27/4727","text":"Philip B. Stark"},{"@pid":"t/VanessaTeague","text":"Vanessa Teague"},{"@pid":"p/PLVora","text":"Poorvi L. Vora"}]},"title":"End-to-end verifiability.","venue":"CoRR","volume":"abs/1504.03778","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenalohRRSTV15","ee":"http://arxiv.org/abs/1504.03778","url":"https://dblp.org/rec/journals/corr/BenalohRRSTV15"}, "url":"URL#3672267" }, { "@score":"1", "@id":"3672274", "info":{"authors":{"author":[{"@pid":"b/MichaelABender","text":"Michael A. Bender"},{"@pid":"09/11461","text":"Samuel McCauley"},{"@pid":"51/1169","text":"Andrew McGregor 0001"},{"@pid":"124/3768-2","text":"Shikha Singh 0002"},{"@pid":"162/0100","text":"Hoa T. Vu"}]},"title":"Run Generation Revisited: What Goes Up May or May Not Come Down.","venue":"CoRR","volume":"abs/1504.06501","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenderMMSV15","ee":"http://arxiv.org/abs/1504.06501","url":"https://dblp.org/rec/journals/corr/BenderMMSV15"}, "url":"URL#3672274" }, { "@score":"1", "@id":"3672286", "info":{"authors":{"author":[{"@pid":"71/1110","text":"Nikola Benes"},{"@pid":"150/6922","text":"Peter Bezdek"},{"@pid":"l/KimGuldstrandLarsen","text":"Kim G. Larsen"},{"@pid":"s/JiriSrba","text":"Jirí Srba"}]},"title":"Language Emptiness of Continuous-Time Parametric Timed Automata.","venue":"CoRR","volume":"abs/1504.07838","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenesBLS15","ee":"http://arxiv.org/abs/1504.07838","url":"https://dblp.org/rec/journals/corr/BenesBLS15"}, "url":"URL#3672286" }, { "@score":"1", "@id":"3672300", "info":{"authors":{"author":[{"@pid":"133/8541","text":"Heike Benninghoff"},{"@pid":"15/5243","text":"Harald Garcke"}]},"title":"Image Segmentation and Restoration Using Parametric Contours With Free Endpoints.","venue":"CoRR","volume":"abs/1504.07259","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenninghoffG15","ee":"http://arxiv.org/abs/1504.07259","url":"https://dblp.org/rec/journals/corr/BenninghoffG15"}, "url":"URL#3672300" }, { "@score":"1", "@id":"3672313", "info":{"authors":{"author":[{"@pid":"28/8775","text":"José Bento 0001"},{"@pid":"35/7150","text":"Nate Derbinsky"},{"@pid":"161/0067","text":"Charles Mathy"},{"@pid":"40/3651","text":"Jonathan S. Yedidia"}]},"title":"Proximal operators for multi-agent path planning.","venue":"CoRR","volume":"abs/1504.01783","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BentoDMY15","ee":"http://arxiv.org/abs/1504.01783","url":"https://dblp.org/rec/journals/corr/BentoDMY15"}, "url":"URL#3672313" }, { "@score":"1", "@id":"3672315", "info":{"authors":{"author":{"@pid":"161/9876","text":"David M. Benton"}},"title":"Concurrent codes: A holographic-type encoding robust against noise and loss.","venue":"CoRR","volume":"abs/1504.04263","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Benton15","ee":"http://arxiv.org/abs/1504.04263","url":"https://dblp.org/rec/journals/corr/Benton15"}, "url":"URL#3672315" }, { "@score":"1", "@id":"3672316", "info":{"authors":{"author":[{"@pid":"144/7821","text":"Samuel Benz"},{"@pid":"156/3229","text":"Leandro Pacheco de Sousa"},{"@pid":"90/2612","text":"Fernando Pedone"}]},"title":"Stretching Multi-Ring Paxos.","venue":"CoRR","volume":"abs/1504.04942","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenzSP15","ee":"http://arxiv.org/abs/1504.04942","url":"https://dblp.org/rec/journals/corr/BenzSP15"}, "url":"URL#3672316" }, { "@score":"1", "@id":"3672317", "info":{"authors":{"author":[{"@pid":"161/9954","text":"Kirell Benzi"},{"@pid":"120/7600","text":"Benjamin Ricaud"},{"@pid":"16/355","text":"Pierre Vandergheynst"}]},"title":"Principal Patterns on Graphs: Discovering Coherent Structures in Datasets.","venue":"CoRR","volume":"abs/1504.08153","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BenziRV15","ee":"http://arxiv.org/abs/1504.08153","url":"https://dblp.org/rec/journals/corr/BenziRV15"}, "url":"URL#3672317" }, { "@score":"1", "@id":"3672318", "info":{"authors":{"author":[{"@pid":"70/7495","text":"Debasish Bera"},{"@pid":"160/4475","text":"Sant S. Pathak"},{"@pid":"161/9798","text":"Indrajit Chakrabarty"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Another look in the Analysis of Cooperative Spectrum Sensing over Nakagami-$m$ Fading Channels.","venue":"CoRR","volume":"abs/1504.08367","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BeraPCK15","ee":"http://arxiv.org/abs/1504.08367","url":"https://dblp.org/rec/journals/corr/BeraPCK15"}, "url":"URL#3672318" }, { "@score":"1", "@id":"3672320", "info":{"authors":{"author":[{"@pid":"b/BeatriceBerard","text":"Béatrice Bérard"},{"@pid":"h/SergeHaddad","text":"Serge Haddad"},{"@pid":"p/ClaudinePicaronny","text":"Claudine Picaronny"},{"@pid":"64/522","text":"Mohab Safey El Din"},{"@pid":"13/8864","text":"Mathieu Sassolas"}]},"title":"Polynomial Interrupt Timed Automata.","venue":"CoRR","volume":"abs/1504.04541","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerardHPDS15","ee":"http://arxiv.org/abs/1504.04541","url":"https://dblp.org/rec/journals/corr/BerardHPDS15"}, "url":"URL#3672320" }, { "@score":"1", "@id":"3672327", "info":{"authors":{"author":[{"@pid":"82/7567","text":"Kristóf Bérczi"},{"@pid":"63/3725","text":"Attila Bernáth"},{"@pid":"121/1686","text":"Máté Vizer"}]},"title":"Regular graphs are antimagic.","venue":"CoRR","volume":"abs/1504.08146","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BercziBV15","ee":"http://arxiv.org/abs/1504.08146","url":"https://dblp.org/rec/journals/corr/BercziBV15"}, "url":"URL#3672327" }, { "@score":"1", "@id":"3672336", "info":{"authors":{"author":[{"@pid":"151/6310","text":"Elisabetta Bergamini"},{"@pid":"55/3065","text":"Henning Meyerhenke"}]},"title":"Fully-dynamic Approximation of Betweenness Centrality.","venue":"CoRR","volume":"abs/1504.07091","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BergaminiM15","ee":"http://arxiv.org/abs/1504.07091","url":"https://dblp.org/rec/journals/corr/BergaminiM15"}, "url":"URL#3672336" }, { "@score":"1", "@id":"3672342", "info":{"authors":{"author":[{"@pid":"136/9318","text":"Mathias Berglund"},{"@pid":"50/6787","text":"Tapani Raiko"},{"@pid":"14/3886","text":"Mikko Honkala"},{"@pid":"162/0143","text":"Leo Kärkkäinen"},{"@pid":"32/837","text":"Akos Vetek"},{"@pid":"53/521","text":"Juha Karhunen"}]},"title":"Bidirectional Recurrent Neural Networks as Generative Models - Reconstructing Gaps in Time Series.","venue":"CoRR","volume":"abs/1504.01575","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BerglundRHKVK15","ee":"http://arxiv.org/abs/1504.01575","url":"https://dblp.org/rec/journals/corr/BerglundRHKVK15"}, "url":"URL#3672342" }, { "@score":"1", "@id":"3672343", "info":{"authors":{"author":{"@pid":"b/JanABergstra","text":"Jan A. Bergstra"}},"title":"Architectural Adequacy and Evolutionary Adequacy as Characteristics of a Candidate Informational Money.","venue":"CoRR","volume":"abs/1504.07184","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bergstra15","ee":"http://arxiv.org/abs/1504.07184","url":"https://dblp.org/rec/journals/corr/Bergstra15"}, "url":"URL#3672343" }, { "@score":"1", "@id":"3672347", "info":{"authors":{"author":[{"@pid":"b/JanABergstra","text":"Jan A. Bergstra"},{"@pid":"p/APonse","text":"Alban Ponse"}]},"title":"Evaluation trees for proposition algebra.","venue":"CoRR","volume":"abs/1504.08321","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BergstraP15","ee":"http://arxiv.org/abs/1504.08321","url":"https://dblp.org/rec/journals/corr/BergstraP15"}, "url":"URL#3672347" }, { "@score":"1", "@id":"3672353", "info":{"authors":{"author":{"@pid":"79/7411","text":"Mikhail V. Berlinkov"}},"title":"Highest Trees of Random Mappings.","venue":"CoRR","volume":"abs/1504.04532","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Berlinkov15","ee":"http://arxiv.org/abs/1504.04532","url":"https://dblp.org/rec/journals/corr/Berlinkov15"}, "url":"URL#3672353" }, { "@score":"1", "@id":"3672365", "info":{"authors":{"author":[{"@pid":"143/6193","text":"Carlo Bernava"},{"@pid":"25/1338","text":"Giacomo Fiumara"},{"@pid":"62/2483","text":"Dario Maggiorini"},{"@pid":"74/5741","text":"Alessandro Provetti"},{"@pid":"25/505","text":"Laura Anna Ripamonti"}]},"title":"RDF annotation of Second Life objects: Knowledge Representation meets Social Virtual reality.","venue":"CoRR","volume":"abs/1504.02358","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BernavaFMPR15","ee":"http://arxiv.org/abs/1504.02358","url":"https://dblp.org/rec/journals/corr/BernavaFMPR15"}, "url":"URL#3672365" }, { "@score":"1", "@id":"3672383", "info":{"authors":{"author":[{"@pid":"155/9783","text":"Gedas Bertasius"},{"@pid":"71/3879","text":"Jianbo Shi"},{"@pid":"75/2854","text":"Lorenzo Torresani"}]},"title":"High-for-Low and Low-for-High: Efficient Boundary Detection from Deep Object Features and its Applications to High-Level Vision.","venue":"CoRR","volume":"abs/1504.06201","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BertasiusST15","ee":"http://arxiv.org/abs/1504.06201","url":"https://dblp.org/rec/journals/corr/BertasiusST15"}, "url":"URL#3672383" }, { "@score":"1", "@id":"3672404", "info":{"authors":{"author":[{"@pid":"150/6484","text":"Bert Besser"},{"@pid":"161/9778","text":"Bastian Werth"}]},"title":"On the Approximation Performance of Degree Heuristics for Matching.","venue":"CoRR","volume":"abs/1504.05830","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BesserW15","ee":"http://arxiv.org/abs/1504.05830","url":"https://dblp.org/rec/journals/corr/BesserW15"}, "url":"URL#3672404" }, { "@score":"1", "@id":"3672406", "info":{"authors":{"author":[{"@pid":"150/6292","text":"Alessandro Bessi"},{"@pid":"60/9927","text":"Fabiana Zollo"},{"@pid":"151/6677","text":"Michela Del Vicario"},{"@pid":"92/9669","text":"Antonio Scala"},{"@pid":"50/6478","text":"Guido Caldarelli"},{"@pid":"60/5184","text":"Walter Quattrociocchi"}]},"title":"Trend of Narratives in the Age of Misinformation.","venue":"CoRR","volume":"abs/1504.05163","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BessiZVSCQ15","ee":"http://arxiv.org/abs/1504.05163","url":"https://dblp.org/rec/journals/corr/BessiZVSCQ15"}, "url":"URL#3672406" }, { "@score":"1", "@id":"3672440", "info":{"authors":{"author":[{"@pid":"149/2432","text":"Amey Bhangale"},{"@pid":"38/3658","text":"Ramprasad Saptharishi"},{"@pid":"00/8171","text":"Girish Varma"},{"@pid":"147/5130","text":"Rakesh Venkat"}]},"title":"On Fortification of General Games.","venue":"CoRR","volume":"abs/1504.05556","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhangaleSVV15","ee":"http://arxiv.org/abs/1504.05556","url":"https://dblp.org/rec/journals/corr/BhangaleSVV15"}, "url":"URL#3672440" }, { "@score":"1", "@id":"3672442", "info":{"authors":{"author":[{"@pid":"176/5794","text":"Bharath Bettagere Nagaraja"},{"@pid":"176/5714","text":"Kyatsandra G. Nagananda"}]},"title":"Caching with Unknown Popularity Profiles in Small Cell Networks.","venue":"CoRR","volume":"abs/1504.03632","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BharathN15","ee":"http://arxiv.org/abs/1504.03632","url":"https://dblp.org/rec/journals/corr/BharathN15"}, "url":"URL#3672442" }, { "@score":"1", "@id":"3672466", "info":{"authors":{"author":[{"@pid":"69/3637","text":"Sourav Bhattacharya"},{"@pid":"161/9897","text":"Otto Huhta"},{"@pid":"39/2508","text":"N. Asokan"}]},"title":"LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling.","venue":"CoRR","volume":"abs/1504.04730","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaHA15","ee":"http://arxiv.org/abs/1504.04730","url":"https://dblp.org/rec/journals/corr/BhattacharyaHA15"}, "url":"URL#3672466" }, { "@score":"1", "@id":"3672467", "info":{"authors":{"author":[{"@pid":"57/3907","text":"Sayan Bhattacharya"},{"@pid":"h/MonikaRauchHenzinger","text":"Monika Henzinger"},{"@pid":"61/2421","text":"Danupon Nanongkai"},{"@pid":"29/5273","text":"Charalampos E. Tsourakakis"}]},"title":"Space- and Time-Efficient Algorithm for Maintaining Dense Subgraphs on One-Pass Dynamic Streams.","venue":"CoRR","volume":"abs/1504.02268","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaHNT15","ee":"http://arxiv.org/abs/1504.02268","url":"https://dblp.org/rec/journals/corr/BhattacharyaHNT15"}, "url":"URL#3672467" }, { "@score":"1", "@id":"3672468", "info":{"authors":{"author":[{"@pid":"129/2787","text":"Anup Bhattacharya"},{"@pid":"63/1704","text":"Ragesh Jaiswal"},{"@pid":"k/AmitKumar1","text":"Amit Kumar 0001"}]},"title":"Faster Algorithms for the Constrained k-means Problem.","venue":"CoRR","volume":"abs/1504.02564","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaJ015","ee":"http://arxiv.org/abs/1504.02564","url":"https://dblp.org/rec/journals/corr/BhattacharyaJ015"}, "url":"URL#3672468" }, { "@score":"1", "@id":"3672469", "info":{"authors":{"author":[{"@pid":"117/8274","text":"Avik Bhattacharya"},{"@pid":"142/6368","text":"Arnab Muhuri"},{"@pid":"142/6575","text":"Shaunak De"},{"@pid":"142/6257","text":"Surendar Manickam"},{"@pid":"f/ACFrery","text":"Alejandro C. Frery"}]},"title":"Modifying the Yamaguchi Four-Component Decomposition Scattering Powers Using a Stochastic Distance.","venue":"CoRR","volume":"abs/1504.01000","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaMDM15","ee":"http://arxiv.org/abs/1504.01000","url":"https://dblp.org/rec/journals/corr/BhattacharyaMDM15"}, "url":"URL#3672469" }, { "@score":"1", "@id":"3672471", "info":{"authors":{"author":[{"@pid":"07/8038","text":"Bhaswar B. Bhattacharya"},{"@pid":"80/6006","text":"Gregory Valiant"}]},"title":"Testing Closeness With Unequal Sized Samples.","venue":"CoRR","volume":"abs/1504.04599","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhattacharyaV15","ee":"http://arxiv.org/abs/1504.04599","url":"https://dblp.org/rec/journals/corr/BhattacharyaV15"}, "url":"URL#3672471" }, { "@score":"1", "@id":"3672485", "info":{"authors":{"author":{"@pid":"124/3741","text":"C. Dharmani Bhaveshkumar"}},"title":"Gradient of Probability Density Functions based Contrasts for Blind Source Separation (BSS).","venue":"CoRR","volume":"abs/1504.02712","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bhaveshkumar15","ee":"http://arxiv.org/abs/1504.02712","url":"https://dblp.org/rec/journals/corr/Bhaveshkumar15"}, "url":"URL#3672485" }, { "@score":"1", "@id":"3672489", "info":{"authors":{"author":[{"@pid":"50/10413","text":"Bhaskar Bhuyan"},{"@pid":"11/6140","text":"Nityananda Sarma"}]},"title":"A Delay Aware Routing Protocol for Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1504.02866","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BhuyanS15","ee":"http://arxiv.org/abs/1504.02866","url":"https://dblp.org/rec/journals/corr/BhuyanS15"}, "url":"URL#3672489" }, { "@score":"1", "@id":"3672494", "info":{"authors":{"author":[{"@pid":"140/7374","text":"Piotr Bialas"},{"@pid":"158/8940","text":"Adam Strzelecki"}]},"title":"Benchmarking the cost of thread divergence in CUDA.","venue":"CoRR","volume":"abs/1504.01650","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BialasS15","ee":"http://arxiv.org/abs/1504.01650","url":"https://dblp.org/rec/journals/corr/BialasS15"}, "url":"URL#3672494" }, { "@score":"1", "@id":"3672495", "info":{"authors":{"author":{"@pid":"50/3082","text":"Pascal Bianchi"}},"title":"Ergodic convergence of a stochastic proximal point algorithm.","venue":"CoRR","volume":"abs/1504.05400","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bianchi15","ee":"http://arxiv.org/abs/1504.05400","url":"https://dblp.org/rec/journals/corr/Bianchi15"}, "url":"URL#3672495" }, { "@score":"1", "@id":"3672500", "info":{"authors":{"author":[{"@pid":"36/1511-1","text":"Simone Bianco 0001"},{"@pid":"53/6816","text":"Claudio Cusano"},{"@pid":"47/3014","text":"Raimondo Schettini"}]},"title":"Color Constancy Using CNNs.","venue":"CoRR","volume":"abs/1504.04548","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BiancoCS15","ee":"http://arxiv.org/abs/1504.04548","url":"https://dblp.org/rec/journals/corr/BiancoCS15"}, "url":"URL#3672500" }, { "@score":"1", "@id":"3672545", "info":{"authors":{"author":[{"@pid":"32/3463","text":"Philip Bille"},{"@pid":"129/1722","text":"Patrick Hagge Cording"},{"@pid":"96/705","text":"Inge Li Gørtz"},{"@pid":"161/9987","text":"Frederik Rye Skjoldjensen"},{"@pid":"08/8612","text":"Hjalte Wedel Vildhøj"},{"@pid":"16/10360","text":"Søren Vind"}]},"title":"Dynamic Relative Compression.","venue":"CoRR","volume":"abs/1504.07851","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BilleCGSVV15","ee":"http://arxiv.org/abs/1504.07851","url":"https://dblp.org/rec/journals/corr/BilleCGSVV15"}, "url":"URL#3672545" }, { "@score":"1", "@id":"3672546", "info":{"authors":{"author":[{"@pid":"32/3463","text":"Philip Bille"},{"@pid":"96/705","text":"Inge Li Gørtz"},{"@pid":"143/7256","text":"Mathias Bæk Tejs Knudsen"},{"@pid":"l/MosheLewenstein","text":"Moshe Lewenstein"},{"@pid":"08/8612","text":"Hjalte Wedel Vildhøj"}]},"title":"Longest Common Extensions in Sublinear Space.","venue":"CoRR","volume":"abs/1504.02671","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BilleGKLV15","ee":"http://arxiv.org/abs/1504.02671","url":"https://dblp.org/rec/journals/corr/BilleGKLV15"}, "url":"URL#3672546" }, { "@score":"1", "@id":"3672554", "info":{"authors":{"author":[{"@pid":"129/6546","text":"Timo Bingmann"},{"@pid":"162/0191","text":"Thomas Keh"},{"@pid":"s/PeterSanders","text":"Peter Sanders 0001"}]},"title":"A Bulk-Parallel Priority Queue in External Memory with STXXL.","venue":"CoRR","volume":"abs/1504.00545","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BingmannKS15","ee":"http://arxiv.org/abs/1504.00545","url":"https://dblp.org/rec/journals/corr/BingmannKS15"}, "url":"URL#3672554" }, { "@score":"1", "@id":"3672558", "info":{"authors":{"author":[{"@pid":"45/1559","text":"Carsten Binnig"},{"@pid":"c/UgurCetintemel","text":"Ugur Çetintemel"},{"@pid":"147/4971","text":"Andrew Crotty"},{"@pid":"147/4899","text":"Alex Galakatos"},{"@pid":"26/6037","text":"Tim Kraska"},{"@pid":"141/9169","text":"Erfan Zamanian"},{"@pid":"z/SBZdonik","text":"Stanley B. Zdonik"}]},"title":"The End of Slow Networks: It's Time for a Redesign.","venue":"CoRR","volume":"abs/1504.01048","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BinnigCCGKZZ15","ee":"http://arxiv.org/abs/1504.01048","url":"https://dblp.org/rec/journals/corr/BinnigCCGKZZ15"}, "url":"URL#3672558" }, { "@score":"1", "@id":"3672575", "info":{"authors":{"author":[{"@pid":"161/9919","text":"Rawad Bitar"},{"@pid":"122/2942","text":"Salim El Rouayheb"}]},"title":"Securing Data against Limited-Knowledge Adversaries in Distributed Storage Systems.","venue":"CoRR","volume":"abs/1504.05999","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BitarR15","ee":"http://arxiv.org/abs/1504.05999","url":"https://dblp.org/rec/journals/corr/BitarR15"}, "url":"URL#3672575" }, { "@score":"1", "@id":"3672578", "info":{"authors":{"author":[{"@pid":"117/4994","text":"Benjamin Bittner"},{"@pid":"66/3003","text":"Marco Bozzano"},{"@pid":"96/4147","text":"Roberto Cavada"},{"@pid":"13/5961","text":"Alessandro Cimatti"},{"@pid":"138/5577","text":"Marco Gario"},{"@pid":"19/3686","text":"Alberto Griggio"},{"@pid":"67/7880","text":"Cristian Mattarei"},{"@pid":"84/7880","text":"Andrea Micheli"},{"@pid":"162/0229","text":"Gianni Zampedri"}]},"title":"The xSAP Safety Analysis Platform.","venue":"CoRR","volume":"abs/1504.07513","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BittnerBCCGGMMZ15","ee":"http://arxiv.org/abs/1504.07513","url":"https://dblp.org/rec/journals/corr/BittnerBCCGGMMZ15"}, "url":"URL#3672578" }, { "@score":"1", "@id":"3672587", "info":{"authors":{"author":{"@pid":"28/6676","text":"Andreas Björklund"}},"title":"Uniquely Coloring Graphs over Path Decompositions.","venue":"CoRR","volume":"abs/1504.03670","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bjorklund15","ee":"http://arxiv.org/abs/1504.03670","url":"https://dblp.org/rec/journals/corr/Bjorklund15"}, "url":"URL#3672587" }, { "@score":"1", "@id":"3672593", "info":{"authors":{"author":[{"@pid":"67/1658","text":"Emil Björnson"},{"@pid":"48/1437","text":"Luca Sanguinetti"},{"@pid":"90/3967","text":"Marios Kountouris"}]},"title":"Designing Wireless Broadband Access for Energy Efficiency: Are Small Cells the Only Answer?","venue":"CoRR","volume":"abs/1504.07566","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BjornsonSK15","ee":"http://arxiv.org/abs/1504.07566","url":"https://dblp.org/rec/journals/corr/BjornsonSK15"}, "url":"URL#3672593" }, { "@score":"1", "@id":"3672602", "info":{"authors":{"author":[{"@pid":"51/10359","text":"Neli Blagus"},{"@pid":"17/8636","text":"Lovro Subelj"},{"@pid":"146/0822","text":"Gregor Weiss"},{"@pid":"92/492","text":"Marko Bajec"}]},"title":"Sampling promotes community structure in social and information networks.","venue":"CoRR","volume":"abs/1504.03097","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlagusSWB15","ee":"http://arxiv.org/abs/1504.03097","url":"https://dblp.org/rec/journals/corr/BlagusSWB15"}, "url":"URL#3672602" }, { "@score":"1", "@id":"3672631", "info":{"authors":{"author":[{"@pid":"36/2705","text":"Niklas Blomberg"},{"@pid":"52/4530","text":"Cristian R. Rojas"},{"@pid":"87/1451","text":"Bo Wahlberg"}]},"title":"Approximate Regularization Paths for Nuclear Norm Minimization Using Singular Value Bounds - With Implementation and Extended Appendix.","venue":"CoRR","volume":"abs/1504.05208","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BlombergRW15","ee":"http://arxiv.org/abs/1504.05208","url":"https://dblp.org/rec/journals/corr/BlombergRW15"}, "url":"URL#3672631" }, { "@score":"1", "@id":"3672637", "info":{"authors":{"author":[{"@pid":"89/8157","text":"Michael Bloodgood"},{"@pid":"03/5658","text":"John Grothendieck"}]},"title":"Analysis of Stopping Active Learning based on Stabilizing Predictions.","venue":"CoRR","volume":"abs/1504.06329","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BloodgoodG15","ee":"http://arxiv.org/abs/1504.06329","url":"https://dblp.org/rec/journals/corr/BloodgoodG15"}, "url":"URL#3672637" }, { "@score":"1", "@id":"3672658", "info":{"authors":{"author":{"@pid":"161/9829","text":"Amir Hosein Bodaghi"}},"title":"A Novel Model for Integration of Information Security Management against Replication Attack Based on Biological Structures of the Body.","venue":"CoRR","volume":"abs/1504.03340","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bodaghi15","ee":"http://arxiv.org/abs/1504.03340","url":"https://dblp.org/rec/journals/corr/Bodaghi15"}, "url":"URL#3672658" }, { "@score":"1", "@id":"3672689", "info":{"authors":{"author":[{"@pid":"162/0188","text":"Dereje Kifle Boku"},{"@pid":"90/1375","text":"Claus Fieker"},{"@pid":"05/4059","text":"Wolfram Decker"},{"@pid":"125/7747","text":"Andreas Steenpaß"}]},"title":"Gröbner Bases over Algebraic Number Fields.","venue":"CoRR","volume":"abs/1504.04564","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BokuFDS15","ee":"http://arxiv.org/abs/1504.04564","url":"https://dblp.org/rec/journals/corr/BokuFDS15"}, "url":"URL#3672689" }, { "@score":"1", "@id":"3672690", "info":{"authors":{"author":[{"@pid":"70/11023","text":"Peter K. Bol"},{"@pid":"23/2735","text":"Chao-Lin Liu"},{"@pid":"162/0074","text":"Hongsu Wang"}]},"title":"Mining and discovering biographical information in Difangzhi with a language-model-based approach.","venue":"CoRR","volume":"abs/1504.02148","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BolLW15","ee":"http://arxiv.org/abs/1504.02148","url":"https://dblp.org/rec/journals/corr/BolLW15"}, "url":"URL#3672690" }, { "@score":"1", "@id":"3672695", "info":{"authors":{"author":[{"@pid":"147/3344","text":"Marc Bolaños"},{"@pid":"r/PetiaRadeva","text":"Petia Radeva"}]},"title":"Ego-object discovery.","venue":"CoRR","volume":"abs/1504.01639","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BolanosR15","ee":"http://arxiv.org/abs/1504.01639","url":"https://dblp.org/rec/journals/corr/BolanosR15"}, "url":"URL#3672695" }, { "@score":"1", "@id":"3672708", "info":{"authors":{"author":[{"@pid":"68/9186","text":"Tamara Bonaci"},{"@pid":"161/9773","text":"Jeffrey Herron"},{"@pid":"161/9857","text":"Tariq Yusuf"},{"@pid":"115/9656","text":"Junjie Yan"},{"@pid":"k/TadayoshiKohno","text":"Tadayoshi Kohno"},{"@pid":"37/6001","text":"Howard Jay Chizeck"}]},"title":"To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots.","venue":"CoRR","volume":"abs/1504.04339","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BonaciHYYKC15","ee":"http://arxiv.org/abs/1504.04339","url":"https://dblp.org/rec/journals/corr/BonaciHYYKC15"}, "url":"URL#3672708" }, { "@score":"1", "@id":"3672750", "info":{"authors":{"author":[{"@pid":"161/9942","text":"Siddharth Bora"},{"@pid":"161/9986","text":"Harvineet Singh"},{"@pid":"162/0230","text":"Anirban Sen"},{"@pid":"77/5034","text":"Amitabha Bagchi"},{"@pid":"14/167","text":"Parag Singla"}]},"title":"On the Role of Conductance, Geography and Topology in Predicting Hashtag Virality.","venue":"CoRR","volume":"abs/1504.05351","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoraSSBS15","ee":"http://arxiv.org/abs/1504.05351","url":"https://dblp.org/rec/journals/corr/BoraSSBS15"}, "url":"URL#3672750" }, { "@score":"1", "@id":"3672771", "info":{"authors":{"author":[{"@pid":"157/8236","text":"Tuhin Borgohain"},{"@pid":"02/9463","text":"Uday Kumar"},{"@pid":"72/4268","text":"Sugata Sanyal"}]},"title":"Survey of Operating Systems for the IoT Environment.","venue":"CoRR","volume":"abs/1504.02517","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BorgohainKS15a","ee":"http://arxiv.org/abs/1504.02517","url":"https://dblp.org/rec/journals/corr/BorgohainKS15a"}, "url":"URL#3672771" }, { "@score":"1", "@id":"3672819", "info":{"authors":{"author":[{"@pid":"120/5222","text":"Thomas Bosch"},{"@pid":"98/8574","text":"Benjamin Zapilko"},{"@pid":"132/6103","text":"Joachim Wackerow"},{"@pid":"22/5420-1","text":"Kai Eckert 0001"}]},"title":"An Evaluation of Metadata and Data Quality on Person-Level, Aggregated, Thesauri, Statistical Classifications, and Rectangular Data Sets.","venue":"CoRR","volume":"abs/1504.04478","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoschZW015","ee":"http://arxiv.org/abs/1504.04478","url":"https://dblp.org/rec/journals/corr/BoschZW015"}, "url":"URL#3672819" }, { "@score":"1", "@id":"3672820", "info":{"authors":{"author":[{"@pid":"120/5222","text":"Thomas Bosch"},{"@pid":"98/8574","text":"Benjamin Zapilko"},{"@pid":"132/6103","text":"Joachim Wackerow"},{"@pid":"22/5420-1","text":"Kai Eckert 0001"}]},"title":"RDF Constraints to Validate Rectangular Data and Metadata on Person-Level Data, Aggregated Data, Thesauri, and Statistical Classifications.","venue":"CoRR","volume":"abs/1504.04479","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoschZW015a","ee":"http://arxiv.org/abs/1504.04479","url":"https://dblp.org/rec/journals/corr/BoschZW015a"}, "url":"URL#3672820" }, { "@score":"1", "@id":"3672834", "info":{"authors":{"author":{"@pid":"162/0055","text":"Thomas Bosman"}},"title":"A Solution Merging Heuristic for the Steiner Problem in Graphs Using Tree Decompositions.","venue":"CoRR","volume":"abs/1504.07834","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bosman15","ee":"http://arxiv.org/abs/1504.07834","url":"https://dblp.org/rec/journals/corr/Bosman15"}, "url":"URL#3672834" }, { "@score":"1", "@id":"3672851", "info":{"authors":{"author":[{"@pid":"64/7537","text":"Matko Botincan"},{"@pid":"77/665","text":"Mike Dodds"},{"@pid":"30/5360","text":"Stephen Magill"}]},"title":"Refining Existential Properties in Separation Logic Analyses.","venue":"CoRR","volume":"abs/1504.08309","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BotincanDM15","ee":"http://arxiv.org/abs/1504.08309","url":"https://dblp.org/rec/journals/corr/BotincanDM15"}, "url":"URL#3672851" }, { "@score":"1", "@id":"3672854", "info":{"authors":{"author":[{"@pid":"81/9276","text":"Giulio Bottegal"},{"@pid":"82/2008","text":"Gianluigi Pillonetto"},{"@pid":"67/45","text":"Håkan Hjalmarsson"}]},"title":"Bayesian kernel-based system identification with quantized output data.","venue":"CoRR","volume":"abs/1504.06877","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BottegalPH15","ee":"http://arxiv.org/abs/1504.06877","url":"https://dblp.org/rec/journals/corr/BottegalPH15"}, "url":"URL#3672854" }, { "@score":"1", "@id":"3672860", "info":{"authors":{"author":[{"@pid":"161/9791","text":"Sébastien Bouchard"},{"@pid":"13/1903","text":"Yoann Dieudonné"},{"@pid":"05/645","text":"Bertrand Ducourthial"}]},"title":"Byzantine Gathering in Networks.","venue":"CoRR","volume":"abs/1504.01623","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BouchardDD15","ee":"http://arxiv.org/abs/1504.01623","url":"https://dblp.org/rec/journals/corr/BouchardDD15"}, "url":"URL#3672860" }, { "@score":"1", "@id":"3672893", "info":{"authors":{"author":[{"@pid":"28/985","text":"Christos Boutsidis"},{"@pid":"w/DPWoodruff","text":"David P. Woodruff"}]},"title":"Communication-optimal Distributed Principal Component Analysis in the Column-partition Model.","venue":"CoRR","volume":"abs/1504.06729","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoutsidisW15","ee":"http://arxiv.org/abs/1504.06729","url":"https://dblp.org/rec/journals/corr/BoutsidisW15"}, "url":"URL#3672893" }, { "@score":"1", "@id":"3672904", "info":{"authors":{"author":[{"@pid":"61/2958","text":"Laurence Boxer"},{"@pid":"150/6189","text":"P. Christopher Staecker"}]},"title":"Alternate version of continuity for digital multivalued functions.","venue":"CoRR","volume":"abs/1504.02174","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoxerS15a","ee":"http://arxiv.org/abs/1504.02174","url":"https://dblp.org/rec/journals/corr/BoxerS15a"}, "url":"URL#3672904" }, { "@score":"1", "@id":"3672906", "info":{"authors":{"author":[{"@pid":"135/6050","text":"Arman Boyaci"},{"@pid":"75/6024","text":"Tínaz Ekim"},{"@pid":"84/1877","text":"Mordechai Shalom"}]},"title":"The Maximum Cut Problem in Co-bipartite Chain Graphs.","venue":"CoRR","volume":"abs/1504.03666","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BoyaciES15","ee":"http://arxiv.org/abs/1504.03666","url":"https://dblp.org/rec/journals/corr/BoyaciES15"}, "url":"URL#3672906" }, { "@score":"1", "@id":"3672925", "info":{"authors":{"author":[{"@pid":"b/VictorABraberman","text":"Víctor A. Braberman"},{"@pid":"03/107","text":"Nicolás D'Ippolito"},{"@pid":"k/JeffKramer","text":"Jeff Kramer"},{"@pid":"88/2334","text":"Daniel Sykes"},{"@pid":"21/1391","text":"Sebastián Uchitel"}]},"title":"MORPH: A Reference Architecture for Configuration and Behaviour Self-Adaptation.","venue":"CoRR","volume":"abs/1504.08339","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrabermanDKSU15","ee":"http://arxiv.org/abs/1504.08339","url":"https://dblp.org/rec/journals/corr/BrabermanDKSU15"}, "url":"URL#3672925" }, { "@score":"1", "@id":"3672930", "info":{"authors":{"author":{"@pid":"162/0152","text":"Asbjørn Brændeland"}},"title":"nCk sequences and their difference sequences.","venue":"CoRR","volume":"abs/1504.07595","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Braendeland15","ee":"http://arxiv.org/abs/1504.07595","url":"https://dblp.org/rec/journals/corr/Braendeland15"}, "url":"URL#3672930" }, { "@score":"1", "@id":"3672931", "info":{"authors":{"author":{"@pid":"162/0152","text":"Asbjørn Brændeland"}},"title":"Split-by-edges trees.","venue":"CoRR","volume":"abs/1504.07626","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Braendeland15a","ee":"http://arxiv.org/abs/1504.07626","url":"https://dblp.org/rec/journals/corr/Braendeland15a"}, "url":"URL#3672931" }, { "@score":"1", "@id":"3672953", "info":{"authors":{"author":[{"@pid":"b/UlrikBrandes","text":"Ulrik Brandes"},{"@pid":"128/3534","text":"Michael Hamann"},{"@pid":"18/9558","text":"Ben Strasser"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"}]},"title":"Fast Quasi-Threshold Editing.","venue":"CoRR","volume":"abs/1504.07379","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrandesHSW15","ee":"http://arxiv.org/abs/1504.07379","url":"https://dblp.org/rec/journals/corr/BrandesHSW15"}, "url":"URL#3672953" }, { "@score":"1", "@id":"3672976", "info":{"authors":{"author":[{"@pid":"20/1082","text":"Gábor Braun"},{"@pid":"157/1513","text":"Jonah Brown-Cohen"},{"@pid":"20/11208","text":"Arefin Huq"},{"@pid":"75/7718","text":"Sebastian Pokutta"},{"@pid":"69/3746","text":"Prasad Raghavendra"},{"@pid":"147/4950","text":"Aurko Roy"},{"@pid":"40/9223","text":"Benjamin Weitz"},{"@pid":"11/1068","text":"Daniel Zink"}]},"title":"The matching problem has no small symmetric SDP.","venue":"CoRR","volume":"abs/1504.00703","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BraunBHPRRWZ15","ee":"http://arxiv.org/abs/1504.00703","url":"https://dblp.org/rec/journals/corr/BraunBHPRRWZ15"}, "url":"URL#3672976" }, { "@score":"1", "@id":"3672979", "info":{"authors":{"author":[{"@pid":"20/1082","text":"Gábor Braun"},{"@pid":"75/7718","text":"Sebastian Pokutta"}]},"title":"An information diffusion Fano inequality.","venue":"CoRR","volume":"abs/1504.05492","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BraunP15","ee":"http://arxiv.org/abs/1504.05492","url":"https://dblp.org/rec/journals/corr/BraunP15"}, "url":"URL#3672979" }, { "@score":"1", "@id":"3672986", "info":{"authors":{"author":[{"@pid":"16/6136","text":"Mark Braverman"},{"@pid":"145/5060","text":"Young Kun-Ko"},{"@pid":"11/10308","text":"Aviad Rubinstein"},{"@pid":"85/9060","text":"Omri Weinstein"}]},"title":"ETH Hardness for Densest-$k$-Subgraph with Perfect Completeness.","venue":"CoRR","volume":"abs/1504.08352","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BravermanKRW15","ee":"http://arxiv.org/abs/1504.08352","url":"https://dblp.org/rec/journals/corr/BravermanKRW15"}, "url":"URL#3672986" }, { "@score":"1", "@id":"3672987", "info":{"authors":{"author":[{"@pid":"14/4758","text":"Vladimir Braverman"},{"@pid":"80/4437","text":"Harry Lang"},{"@pid":"312/4104","text":"Keith D. Levin"},{"@pid":"11/4322","text":"Morteza Monemizadeh"}]},"title":"A Unified Approach for Clustering Problems on Sliding Windows.","venue":"CoRR","volume":"abs/1504.05553","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BravermanLLM15","ee":"http://arxiv.org/abs/1504.05553","url":"https://dblp.org/rec/journals/corr/BravermanLLM15"}, "url":"URL#3672987" }, { "@score":"1", "@id":"3673009", "info":{"authors":{"author":[{"@pid":"162/0103","text":"Michael J. Bremner"},{"@pid":"33/3214","text":"Ashley Montanaro"},{"@pid":"69/8146","text":"Dan J. Shepherd"}]},"title":"Average-case complexity versus approximate simulation of commuting quantum computations.","venue":"CoRR","volume":"abs/1504.07999","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BremnerMS15","ee":"http://arxiv.org/abs/1504.07999","url":"https://dblp.org/rec/journals/corr/BremnerMS15"}, "url":"URL#3673009" }, { "@score":"1", "@id":"3673028", "info":{"authors":{"author":[{"@pid":"146/9590","text":"Will Brian"},{"@pid":"m/MWMislove","text":"Michael W. Mislove"}]},"title":"From Haar to Lebesgue via Domain Theory, Revised version.","venue":"CoRR","volume":"abs/1504.00134","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrianM15","ee":"http://arxiv.org/abs/1504.00134","url":"https://dblp.org/rec/journals/corr/BrianM15"}, "url":"URL#3673028" }, { "@score":"1", "@id":"3673034", "info":{"authors":{"author":[{"@pid":"68/5725","text":"Thomas Brihaye"},{"@pid":"b/VeroniqueBruyere","text":"Véronique Bruyère"},{"@pid":"142/2757","text":"Noémie Meunier"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Weak Subgame Perfect Equilibria and their Application to Quantitative Reachability.","venue":"CoRR","volume":"abs/1504.01557","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrihayeBMR15","ee":"http://arxiv.org/abs/1504.01557","url":"https://dblp.org/rec/journals/corr/BrihayeBMR15"}, "url":"URL#3673034" }, { "@score":"1", "@id":"3673036", "info":{"authors":{"author":[{"@pid":"68/5725","text":"Thomas Brihaye"},{"@pid":"95/422","text":"Gilles Geeraerts"},{"@pid":"97/10256","text":"Axel Haddad"},{"@pid":"85/733","text":"Benjamin Monmege"},{"@pid":"135/6266","text":"Guillermo A. Pérez 0001"},{"@pid":"12/7267","text":"Gabriel Renault"}]},"title":"Quantitative Games under Failures.","venue":"CoRR","volume":"abs/1504.06744","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrihayeGHMPR15","ee":"http://arxiv.org/abs/1504.06744","url":"https://dblp.org/rec/journals/corr/BrihayeGHMPR15"}, "url":"URL#3673036" }, { "@score":"1", "@id":"3673038", "info":{"authors":{"author":[{"@pid":"01/8357","text":"Michael J. Brim"},{"@pid":"161/9952","text":"Joshua K. Lothian"}]},"title":"Monitoring Extreme-scale Lustre Toolkit.","venue":"CoRR","volume":"abs/1504.06836","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrimL15","ee":"http://arxiv.org/abs/1504.06836","url":"https://dblp.org/rec/journals/corr/BrimL15"}, "url":"URL#3673038" }, { "@score":"1", "@id":"3673060", "info":{"authors":{"author":[{"@pid":"04/638","text":"Thomas Britz"},{"@pid":"54/411","text":"Keisuke Shiromoto"}]},"title":"On the covering dimension of a linear code.","venue":"CoRR","volume":"abs/1504.02357","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BritzS15","ee":"http://arxiv.org/abs/1504.02357","url":"https://dblp.org/rec/journals/corr/BritzS15"}, "url":"URL#3673060" }, { "@score":"1", "@id":"3673086", "info":{"authors":{"author":[{"@pid":"18/3060","text":"Marcus A. Brubaker"},{"@pid":"117/4854","text":"Ali Punjani"},{"@pid":"07/2099","text":"David J. Fleet"}]},"title":"Building Proteins in a Day: Efficient 3D Molecular Reconstruction.","venue":"CoRR","volume":"abs/1504.03573","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrubakerPF15","ee":"http://arxiv.org/abs/1504.03573","url":"https://dblp.org/rec/journals/corr/BrubakerPF15"}, "url":"URL#3673086" }, { "@score":"1", "@id":"3673092", "info":{"authors":{"author":[{"@pid":"57/2683","text":"Henning Bruhn"},{"@pid":"130/9015","text":"Felix Joos"}]},"title":"A stronger bound for the strong chromatic index.","venue":"CoRR","volume":"abs/1504.02583","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BruhnJ15","ee":"http://arxiv.org/abs/1504.02583","url":"https://dblp.org/rec/journals/corr/BruhnJ15"}, "url":"URL#3673092" }, { "@score":"1", "@id":"3673096", "info":{"authors":{"author":[{"@pid":"155/3512","text":"Maria Bruna"},{"@pid":"12/1369","text":"Radu Grigore"},{"@pid":"28/6047","text":"Stefan Kiefer"},{"@pid":"55/4663","text":"Joël Ouaknine"},{"@pid":"90/2367","text":"James Worrell 0001"}]},"title":"Proving the Herman-Protocol Conjecture.","venue":"CoRR","volume":"abs/1504.01130","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrunaGKOW15","ee":"http://arxiv.org/abs/1504.01130","url":"https://dblp.org/rec/journals/corr/BrunaGKOW15"}, "url":"URL#3673096" }, { "@score":"1", "@id":"3673114", "info":{"authors":{"author":{"@pid":"162/0199","text":"Andrew F. C. Brustolin"}},"title":"Edge Detection Based on Global and Local Parameters of the Image.","venue":"CoRR","volume":"abs/1504.06036","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Brustolin15","ee":"http://arxiv.org/abs/1504.06036","url":"https://dblp.org/rec/journals/corr/Brustolin15"}, "url":"URL#3673114" }, { "@score":"1", "@id":"3673122", "info":{"authors":{"author":[{"@pid":"b/JABrzozowski","text":"Janusz A. Brzozowski"},{"@pid":"97/10625","text":"Marek Szykula"}]},"title":"Complexity of Suffix-Free Regular Languages.","venue":"CoRR","volume":"abs/1504.05159","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BrzozowskiS15","ee":"http://arxiv.org/abs/1504.05159","url":"https://dblp.org/rec/journals/corr/BrzozowskiS15"}, "url":"URL#3673122" }, { "@score":"1", "@id":"3673141", "info":{"authors":{"author":[{"@pid":"13/8696","text":"Sebastian Buchwald"},{"@pid":"82/9655","text":"Manuel Mohr"},{"@pid":"99/44","text":"Ignaz Rutter"}]},"title":"Optimal Shuffle Code with Permutation Instructions.","venue":"CoRR","volume":"abs/1504.07073","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuchwaldMR15","ee":"http://arxiv.org/abs/1504.07073","url":"https://dblp.org/rec/journals/corr/BuchwaldMR15"}, "url":"URL#3673141" }, { "@score":"1", "@id":"3673142", "info":{"authors":{"author":{"@pid":"70/11351","text":"Mitchell Buckley"}},"title":"A formal verification of the theory of parity complexes.","venue":"CoRR","volume":"abs/1504.02297","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Buckley15","ee":"http://arxiv.org/abs/1504.02297","url":"https://dblp.org/rec/journals/corr/Buckley15"}, "url":"URL#3673142" }, { "@score":"1", "@id":"3673146", "info":{"authors":{"author":[{"@pid":"141/2135","text":"Amitalok J. Budkuley"},{"@pid":"28/5000","text":"Bikash Kumar Dey"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"}]},"title":"Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary.","venue":"CoRR","volume":"abs/1504.04351","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BudkuleyDP15","ee":"http://arxiv.org/abs/1504.04351","url":"https://dblp.org/rec/journals/corr/BudkuleyDP15"}, "url":"URL#3673146" }, { "@score":"1", "@id":"3673166", "info":{"authors":{"author":[{"@pid":"126/4933","text":"Mark Bun"},{"@pid":"65/801","text":"Kobbi Nissim"},{"@pid":"125/8532","text":"Uri Stemmer"},{"@pid":"v/SPVadhan","text":"Salil P. Vadhan"}]},"title":"Differentially Private Release and Learning of Threshold Functions.","venue":"CoRR","volume":"abs/1504.07553","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BunNSV15","ee":"http://arxiv.org/abs/1504.07553","url":"https://dblp.org/rec/journals/corr/BunNSV15"}, "url":"URL#3673166" }, { "@score":"1", "@id":"3673175", "info":{"authors":{"author":{"@pid":"161/9961","text":"Maciej Rafal Burak"}},"title":"Inhomogeneous CTMC Model of a Call Center with Balking and Abandonment.","venue":"CoRR","volume":"abs/1504.07908","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Burak15","ee":"http://arxiv.org/abs/1504.07908","url":"https://dblp.org/rec/journals/corr/Burak15"}, "url":"URL#3673175" }, { "@score":"1", "@id":"3673178", "info":{"authors":{"author":{"@pid":"63/1513","text":"John Robert Burger"}},"title":"An New Type Of Artificial Brain Using Controlled Neurons.","venue":"CoRR","volume":"abs/1504.03580","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Burger15","ee":"http://arxiv.org/abs/1504.03580","url":"https://dblp.org/rec/journals/corr/Burger15"}, "url":"URL#3673178" }, { "@score":"1", "@id":"3673179", "info":{"authors":{"author":{"@pid":"16/6722","text":"Thomas Burger"}},"title":"Bridging belief function theory to modern machine learning.","venue":"CoRR","volume":"abs/1504.03874","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Burger15a","ee":"http://arxiv.org/abs/1504.03874","url":"https://dblp.org/rec/journals/corr/Burger15a"}, "url":"URL#3673179" }, { "@score":"1", "@id":"3673181", "info":{"authors":{"author":[{"@pid":"142/8784-2","text":"Jens Bürger 0002"},{"@pid":"44/9508","text":"Alireza Goudarzi"},{"@pid":"s/DarkoStefanovic","text":"Darko Stefanovic"},{"@pid":"t/ChristofTeuscher","text":"Christof Teuscher"}]},"title":"Hierarchical Composition of Memristive Networks for Real-Time Computing.","venue":"CoRR","volume":"abs/1504.02833","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BurgerGST15","ee":"http://arxiv.org/abs/1504.02833","url":"https://dblp.org/rec/journals/corr/BurgerGST15"}, "url":"URL#3673181" }, { "@score":"1", "@id":"3673204", "info":{"authors":{"author":[{"@pid":"00/275","text":"Craig Burton"},{"@pid":"64/3207","text":"Chris Culnane"},{"@pid":"s/SASchneider","text":"Steve A. Schneider"}]},"title":"Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election.","venue":"CoRR","volume":"abs/1504.07098","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BurtonCS15","ee":"http://arxiv.org/abs/1504.07098","url":"https://dblp.org/rec/journals/corr/BurtonCS15"}, "url":"URL#3673204" }, { "@score":"1", "@id":"3673206", "info":{"authors":{"author":{"@pid":"71/8976","text":"Marc Bury"}},"title":"OBDDs and (Almost) $k$-wise Independent Random Variables.","venue":"CoRR","volume":"abs/1504.03842","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Bury15","ee":"http://arxiv.org/abs/1504.03842","url":"https://dblp.org/rec/journals/corr/Bury15"}, "url":"URL#3673206" }, { "@score":"1", "@id":"3673220", "info":{"authors":{"author":[{"@pid":"127/6929-2","text":"Aleksey Buzmakov 0002"},{"@pid":"124/9314","text":"Elias Egho"},{"@pid":"33/2692","text":"Nicolas Jay"},{"@pid":"51/2300","text":"Sergei O. Kuznetsov"},{"@pid":"n/AmedeoNapoli","text":"Amedeo Napoli"},{"@pid":"76/1132","text":"Chedy Raïssi"}]},"title":"On mining complex sequential data by means of FCA and pattern structures.","venue":"CoRR","volume":"abs/1504.02255","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/BuzmakovEJKNR15","ee":"http://arxiv.org/abs/1504.02255","url":"https://dblp.org/rec/journals/corr/BuzmakovEJKNR15"}, "url":"URL#3673220" }, { "@score":"1", "@id":"3673230", "info":{"authors":{"author":{"@pid":"124/3741","text":"C. Dharmani Bhaveshkumar"}},"title":"The Gram-Charlier A Series based Extended Rule-of-Thumb for Bandwidth Selection in Univariate and Multivariate Kernel Density Estimations.","venue":"CoRR","volume":"abs/1504.00781","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/C15","ee":"http://arxiv.org/abs/1504.00781","url":"https://dblp.org/rec/journals/corr/C15"}, "url":"URL#3673230" }, { "@score":"1", "@id":"3673244", "info":{"authors":{"author":{"@pid":"151/4555","text":"Mingjie Cai"}},"title":"Knowledge reduction of dynamic covering decision information systems with varying attribute values.","venue":"CoRR","volume":"abs/1504.02930","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cai15a","ee":"http://arxiv.org/abs/1504.02930","url":"https://dblp.org/rec/journals/corr/Cai15a"}, "url":"URL#3673244" }, { "@score":"1", "@id":"3673247", "info":{"authors":{"author":[{"@pid":"135/6102","text":"Xing Shi Cai"},{"@pid":"d/LucDevroye","text":"Luc Devroye"}]},"title":"The graph structure of a deterministic automaton chosen at random: full version.","venue":"CoRR","volume":"abs/1504.06238","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaiD15","ee":"http://arxiv.org/abs/1504.06238","url":"https://dblp.org/rec/journals/corr/CaiD15"}, "url":"URL#3673247" }, { "@score":"1", "@id":"3673265", "info":{"authors":{"author":[{"@pid":"143/5147","text":"João Cal-Braz"},{"@pid":"34/5084","text":"Raimundo Sampaio Neto"}]},"title":"Projection-based list detection in Generalized Spatial Modulation MIMO systems.","venue":"CoRR","volume":"abs/1504.04896","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cal-BrazN15","ee":"http://arxiv.org/abs/1504.04896","url":"https://dblp.org/rec/journals/corr/Cal-BrazN15"}, "url":"URL#3673265" }, { "@score":"1", "@id":"3673268", "info":{"authors":{"author":[{"@pid":"96/930","text":"Tiziana Calamoneri"},{"@pid":"23/2283","text":"Blerina Sinaimeri"},{"@pid":"161/9921","text":"Mattia Gastaldello"}]},"title":"On Pairwise Compatibility of Some Graph (Super)Classes.","venue":"CoRR","volume":"abs/1504.06454","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalamoneriSG15","ee":"http://arxiv.org/abs/1504.06454","url":"https://dblp.org/rec/journals/corr/CalamoneriSG15"}, "url":"URL#3673268" }, { "@score":"1", "@id":"3673272", "info":{"authors":{"author":{"@pid":"139/2471","text":"Blake Caldwell"}},"title":"Improving Block-level Efficiency with scsi-mq.","venue":"CoRR","volume":"abs/1504.07481","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Caldwell15","ee":"http://arxiv.org/abs/1504.07481","url":"https://dblp.org/rec/journals/corr/Caldwell15"}, "url":"URL#3673272" }, { "@score":"1", "@id":"3673273", "info":{"authors":{"author":[{"@pid":"38/2172","text":"James L. Caldwell"},{"@pid":"30/3076","text":"Ian P. Gent"},{"@pid":"n/PeterNightingale","text":"Peter Nightingale"}]},"title":"Generalized Support and Formal Development of Constraint Propagators.","venue":"CoRR","volume":"abs/1504.05846","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaldwellGN15","ee":"http://arxiv.org/abs/1504.05846","url":"https://dblp.org/rec/journals/corr/CaldwellGN15"}, "url":"URL#3673273" }, { "@score":"1", "@id":"3673277", "info":{"authors":{"author":[{"@pid":"152/7757","text":"Adrian Calma"},{"@pid":"59/8462","text":"Tobias Reitmaier"},{"@pid":"21/4593","text":"Bernhard Sick"},{"@pid":"l/PaulLukowicz","text":"Paul Lukowicz"}]},"title":"A New Vision of Collaborative Active Learning.","venue":"CoRR","volume":"abs/1504.00284","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalmaRSL15","ee":"http://arxiv.org/abs/1504.00284","url":"https://dblp.org/rec/journals/corr/CalmaRSL15"}, "url":"URL#3673277" }, { "@score":"1", "@id":"3673281", "info":{"authors":{"author":[{"@pid":"21/7130","text":"Georgiana Caltais"},{"@pid":"m/BertrandMeyer","text":"Bertrand Meyer 0001"}]},"title":"On the Verification of SCOOP Programs.","venue":"CoRR","volume":"abs/1504.07041","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaltaisM15","ee":"http://arxiv.org/abs/1504.07041","url":"https://dblp.org/rec/journals/corr/CaltaisM15"}, "url":"URL#3673281" }, { "@score":"1", "@id":"3673285", "info":{"authors":{"author":[{"@pid":"c/DiegoCalvanese","text":"Diego Calvanese"},{"@pid":"85/1455","text":"Marco Montali"},{"@pid":"10/11440","text":"Ario Santoso"}]},"title":"Verification of Generalized Inconsistency-Aware Knowledge and Action Bases (Extended Version).","venue":"CoRR","volume":"abs/1504.08108","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalvaneseMS15","ee":"http://arxiv.org/abs/1504.08108","url":"https://dblp.org/rec/journals/corr/CalvaneseMS15"}, "url":"URL#3673285" }, { "@score":"1", "@id":"3673287", "info":{"authors":{"author":[{"@pid":"161/9845","text":"Justus A. Calvin"},{"@pid":"46/2149","text":"Edward F. Valeev"}]},"title":"Task-Based Algorithm for Matrix Multiplication: A Step Towards Block-Sparse Tensor Computing.","venue":"CoRR","volume":"abs/1504.05046","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CalvinV15","ee":"http://arxiv.org/abs/1504.05046","url":"https://dblp.org/rec/journals/corr/CalvinV15"}, "url":"URL#3673287" }, { "@score":"1", "@id":"3673318", "info":{"authors":{"author":[{"@pid":"28/9840L","text":"Clément L. Canonne"},{"@pid":"122/9933","text":"Themis Gouleakis"},{"@pid":"r/RonittRubinfeld","text":"Ronitt Rubinfeld"}]},"title":"Sampling Correctors.","venue":"CoRR","volume":"abs/1504.06544","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CanonneGR15","ee":"http://arxiv.org/abs/1504.06544","url":"https://dblp.org/rec/journals/corr/CanonneGR15"}, "url":"URL#3673318" }, { "@score":"1", "@id":"3673324", "info":{"authors":{"author":{"@pid":"20/8038-1","text":"Yixin Cao 0001"}},"title":"Unit Interval Editing is Fixed-Parameter Tractable.","venue":"CoRR","volume":"abs/1504.04470","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cao15","ee":"http://arxiv.org/abs/1504.04470","url":"https://dblp.org/rec/journals/corr/Cao15"}, "url":"URL#3673324" }, { "@score":"1", "@id":"3673349", "info":{"authors":{"author":[{"@pid":"25/7045-13","text":"Yang Cao 0013"},{"@pid":"13/4242-2","text":"Yao Xie 0002"}]},"title":"Poisson Matrix Recovery and Completion.","venue":"CoRR","volume":"abs/1504.05229","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CaoX15a","ee":"http://arxiv.org/abs/1504.05229","url":"https://dblp.org/rec/journals/corr/CaoX15a"}, "url":"URL#3673349" }, { "@score":"1", "@id":"3673368", "info":{"authors":{"author":{"@pid":"40/9567","text":"Daniel Caragata"}},"title":"On the Security of a Revised Fragile Watermarking Scheme.","venue":"CoRR","volume":"abs/1504.05226","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Caragata15","ee":"http://arxiv.org/abs/1504.05226","url":"https://dblp.org/rec/journals/corr/Caragata15"}, "url":"URL#3673368" }, { "@score":"1", "@id":"3673379", "info":{"authors":{"author":[{"@pid":"161/9890","text":"Hector A. Cardenas"},{"@pid":"161/9916","text":"Chester Holtz"},{"@pid":"161/9912","text":"Maria Janczak"},{"@pid":"162/0119","text":"Philip Meyers"},{"@pid":"162/0084","text":"Nathaniel S. Potrepka"}]},"title":"A Refutation of the Clique-Based P=NP Proofs of LaPlante and Tamta-Pande-Dhami.","venue":"CoRR","volume":"abs/1504.06890","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CardenasHJMP15","ee":"http://arxiv.org/abs/1504.06890","url":"https://dblp.org/rec/journals/corr/CardenasHJMP15"}, "url":"URL#3673379" }, { "@score":"1", "@id":"3673398", "info":{"authors":{"author":[{"@pid":"144/7705","text":"Kevin Carlberg"},{"@pid":"81/9753","text":"Matthew F. Barone"},{"@pid":"65/7616","text":"Harbir Antil"}]},"title":"Galerkin v. discrete-optimal projection in nonlinear model reduction.","venue":"CoRR","volume":"abs/1504.03749","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CarlbergBA15","ee":"http://arxiv.org/abs/1504.03749","url":"https://dblp.org/rec/journals/corr/CarlbergBA15"}, "url":"URL#3673398" }, { "@score":"1", "@id":"3673402", "info":{"authors":{"author":[{"@pid":"161/9823","text":"E. Preston Carman Jr."},{"@pid":"28/6679","text":"Till Westmann"},{"@pid":"43/3643","text":"Vinayak R. Borkar"},{"@pid":"31/3455","text":"Michael J. Carey 0001"},{"@pid":"t/VassilisJTsotras","text":"Vassilis J. Tsotras"}]},"title":"Apache VXQuery: A Scalable XQuery Implementation.","venue":"CoRR","volume":"abs/1504.00331","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CarmanWBCT15","ee":"http://arxiv.org/abs/1504.00331","url":"https://dblp.org/rec/journals/corr/CarmanWBCT15"}, "url":"URL#3673402" }, { "@score":"1", "@id":"3673459", "info":{"authors":{"author":[{"@pid":"150/6789","text":"Simon Castellan"},{"@pid":"41/573","text":"Pierre Clairambault"},{"@pid":"d/PeterDybjer","text":"Peter Dybjer"}]},"title":"Undecidability of Equality in the Free Locally Cartesian Closed Category.","venue":"CoRR","volume":"abs/1504.03995","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CastellanCD15","ee":"http://arxiv.org/abs/1504.03995","url":"https://dblp.org/rec/journals/corr/CastellanCD15"}, "url":"URL#3673459" }, { "@score":"1", "@id":"3673463", "info":{"authors":{"author":[{"@pid":"161/9793","text":"Alonso Castillo-Ramirez"},{"@pid":"77/679","text":"Maximilien Gadouleau"}]},"title":"Universal Simulation of Automata Networks.","venue":"CoRR","volume":"abs/1504.00169","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Castillo-Ramirez15","ee":"http://arxiv.org/abs/1504.00169","url":"https://dblp.org/rec/journals/corr/Castillo-Ramirez15"}, "url":"URL#3673463" }, { "@score":"1", "@id":"3673471", "info":{"authors":{"author":{"@pid":"125/2301","text":"Ferhat Özgür Çatak"}},"title":"Classification with Extreme Learning Machine and Ensemble Algorithms Over Randomly Partitioned Data.","venue":"CoRR","volume":"abs/1504.02975","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Catak15","ee":"http://arxiv.org/abs/1504.02975","url":"https://dblp.org/rec/journals/corr/Catak15"}, "url":"URL#3673471" }, { "@score":"1", "@id":"3673490", "info":{"authors":{"author":[{"@pid":"125/5450","text":"Guido Cavraro"},{"@pid":"145/6522","text":"Reza Arghandeh"},{"@pid":"145/6428","text":"Alexandra von Meier"}]},"title":"Distribution Network Topology Detection with Time Series Measurement Data Analysis.","venue":"CoRR","volume":"abs/1504.05926","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CavraroAM15","ee":"http://arxiv.org/abs/1504.05926","url":"https://dblp.org/rec/journals/corr/CavraroAM15"}, "url":"URL#3673490" }, { "@score":"1", "@id":"3673491", "info":{"authors":{"author":[{"@pid":"125/5450","text":"Guido Cavraro"},{"@pid":"145/6522","text":"Reza Arghandeh"},{"@pid":"145/6428","text":"Alexandra von Meier"},{"@pid":"67/3903","text":"Kameshwar Poolla"}]},"title":"Data-Driven Approach for Distribution Network Topology Detection.","venue":"CoRR","volume":"abs/1504.00724","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CavraroAMP15","ee":"http://arxiv.org/abs/1504.00724","url":"https://dblp.org/rec/journals/corr/CavraroAMP15"}, "url":"URL#3673491" }, { "@score":"1", "@id":"3673520", "info":{"authors":{"author":[{"@pid":"162/0151","text":"Giulio Cerruti"},{"@pid":"45/2686","text":"Damien Chablat"},{"@pid":"74/2497","text":"David Gouaillier"},{"@pid":"71/2086","text":"Sophie Sakka"}]},"title":"Design method for an anthropomorphic hand able to gesture and grasp.","venue":"CoRR","volume":"abs/1504.01151","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CerrutiCGS15","ee":"http://arxiv.org/abs/1504.01151","url":"https://dblp.org/rec/journals/corr/CerrutiCGS15"}, "url":"URL#3673520" }, { "@score":"1", "@id":"3673539", "info":{"authors":{"author":[{"@pid":"97/7478","text":"Sung Ho Chae"},{"@pid":"93/376","text":"Cheol Jeong"}]},"title":"Degrees of Freedom of Interference Channels with Hybrid Beam-forming.","venue":"CoRR","volume":"abs/1504.06743","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChaeJ15","ee":"http://arxiv.org/abs/1504.06743","url":"https://dblp.org/rec/journals/corr/ChaeJ15"}, "url":"URL#3673539" }, { "@score":"1", "@id":"3673554", "info":{"authors":{"author":{"@pid":"65/2136-2","text":"Tanmoy Chakraborty 0002"}},"title":"Leveraging disjoint communities for detecting overlapping community structure.","venue":"CoRR","volume":"abs/1504.06608","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chakraborty15a","ee":"http://arxiv.org/abs/1504.06608","url":"https://dblp.org/rec/journals/corr/Chakraborty15a"}, "url":"URL#3673554" }, { "@score":"1", "@id":"3673565", "info":{"authors":{"author":[{"@pid":"162/0157","text":"Mohnish Chakravarti"},{"@pid":"162/0010","text":"Arati Chakravarti"}]},"title":"Does Gaming Help Improve Cognitive Skills?","venue":"CoRR","volume":"abs/1504.01665","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChakravartiC15","ee":"http://arxiv.org/abs/1504.01665","url":"https://dblp.org/rec/journals/corr/ChakravartiC15"}, "url":"URL#3673565" }, { "@score":"1", "@id":"3673592", "info":{"authors":{"author":[{"@pid":"58/2301","text":"William Chan"},{"@pid":"120/5291","text":"Nan Rosemary Ke"},{"@pid":"78/3616","text":"Ian R. Lane"}]},"title":"Transferring Knowledge from a RNN to a DNN.","venue":"CoRR","volume":"abs/1504.01483","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChanKL15","ee":"http://arxiv.org/abs/1504.01483","url":"https://dblp.org/rec/journals/corr/ChanKL15"}, "url":"URL#3673592" }, { "@score":"1", "@id":"3673595", "info":{"authors":{"author":[{"@pid":"58/2301","text":"William Chan"},{"@pid":"78/3616","text":"Ian R. Lane"}]},"title":"Deep Recurrent Neural Networks for Acoustic Modelling.","venue":"CoRR","volume":"abs/1504.01482","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChanL15a","ee":"http://arxiv.org/abs/1504.01482","url":"https://dblp.org/rec/journals/corr/ChanL15a"}, "url":"URL#3673595" }, { "@score":"1", "@id":"3673597", "info":{"authors":{"author":[{"@pid":"c/THHubertChan","text":"T.-H. Hubert Chan"},{"@pid":"279/8491-1","text":"Li Ning 0001"}]},"title":"Influence Maximization under The Non-progressive Linear Threshold Model.","venue":"CoRR","volume":"abs/1504.00427","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChanN15","ee":"http://arxiv.org/abs/1504.00427","url":"https://dblp.org/rec/journals/corr/ChanN15"}, "url":"URL#3673597" }, { "@score":"1", "@id":"3673606", "info":{"authors":{"author":[{"@pid":"45/8542","text":"Sarath Chandar"},{"@pid":"90/7967","text":"Mitesh M. Khapra"},{"@pid":"86/3862","text":"Hugo Larochelle"},{"@pid":"69/2281","text":"Balaraman Ravindran"}]},"title":"Correlational Neural Networks.","venue":"CoRR","volume":"abs/1504.07225","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChandarKLR15","ee":"http://arxiv.org/abs/1504.07225","url":"https://dblp.org/rec/journals/corr/ChandarKLR15"}, "url":"URL#3673606" }, { "@score":"1", "@id":"3673616", "info":{"authors":{"author":[{"@pid":"132/5349","text":"Muthu Kumar Chandrasekaran"},{"@pid":"k/MinYenKan","text":"Min-Yen Kan"},{"@pid":"t/BernardCYTan","text":"Bernard C. Y. Tan"},{"@pid":"161/9831","text":"Kiruthika Ragupathi"}]},"title":"Learning Instructor Intervention from MOOC Forums: Early Results and Issues.","venue":"CoRR","volume":"abs/1504.07206","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChandrasekaranK15","ee":"http://arxiv.org/abs/1504.07206","url":"https://dblp.org/rec/journals/corr/ChandrasekaranK15"}, "url":"URL#3673616" }, { "@score":"1", "@id":"3673646", "info":{"authors":{"author":[{"@pid":"44/5138","text":"Chii Chang"},{"@pid":"09/1571","text":"Satish Narayana Srirama"},{"@pid":"04/7016","text":"Sea Ling"}]},"title":"Service Discovery and Trust in Mobile Social Network in Proximity.","venue":"CoRR","volume":"abs/1504.01504","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChangSL15","ee":"http://arxiv.org/abs/1504.01504","url":"https://dblp.org/rec/journals/corr/ChangSL15"}, "url":"URL#3673646" }, { "@score":"1", "@id":"3673665", "info":{"authors":{"author":[{"@pid":"50/2598","text":"Bernadette Charron-Bost"},{"@pid":"44/7212","text":"Matthias Függer"},{"@pid":"26/9960","text":"Thomas Nowak"}]},"title":"A Proof of the Convergence of the Hegselmann-Krause Dynamics on the Circle.","venue":"CoRR","volume":"abs/1504.05479","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Charron-BostFN15","ee":"http://arxiv.org/abs/1504.05479","url":"https://dblp.org/rec/journals/corr/Charron-BostFN15"}, "url":"URL#3673665" }, { "@score":"1", "@id":"3673668", "info":{"authors":{"author":[{"@pid":"162/0212","text":"Karima Chatouh"},{"@pid":"41/2162","text":"Kenza Guenda"},{"@pid":"g/TAGulliver","text":"T. Aaron Gulliver"},{"@pid":"161/9781","text":"L. Noui"}]},"title":"On Some Classes of Z2Z4-Linear Codes and their Covering Radius.","venue":"CoRR","volume":"abs/1504.08096","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatouhGGN15","ee":"http://arxiv.org/abs/1504.08096","url":"https://dblp.org/rec/journals/corr/ChatouhGGN15"}, "url":"URL#3673668" }, { "@score":"1", "@id":"3673677", "info":{"authors":{"author":[{"@pid":"92/5602","text":"Krishnendu Chatterjee"},{"@pid":"h/ThomasAHenzinger","text":"Thomas A. Henzinger"},{"@pid":"93/8318","text":"Rasmus Ibsen-Jensen"},{"@pid":"18/1934","text":"Jan Otop"}]},"title":"Edit Distance for Pushdown Automata.","venue":"CoRR","volume":"abs/1504.08259","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatterjeeHIO15","ee":"http://arxiv.org/abs/1504.08259","url":"https://dblp.org/rec/journals/corr/ChatterjeeHIO15"}, "url":"URL#3673677" }, { "@score":"1", "@id":"3673678", "info":{"authors":{"author":[{"@pid":"92/5602","text":"Krishnendu Chatterjee"},{"@pid":"h/ThomasAHenzinger","text":"Thomas A. Henzinger"},{"@pid":"18/1934","text":"Jan Otop"}]},"title":"Nested Weighted Automata.","venue":"CoRR","volume":"abs/1504.06117","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatterjeeHO15","ee":"http://arxiv.org/abs/1504.06117","url":"https://dblp.org/rec/journals/corr/ChatterjeeHO15"}, "url":"URL#3673678" }, { "@score":"1", "@id":"3673679", "info":{"authors":{"author":[{"@pid":"92/5602","text":"Krishnendu Chatterjee"},{"@pid":"93/8318","text":"Rasmus Ibsen-Jensen"},{"@pid":"47/8037","text":"Andreas Pavlogiannis"}]},"title":"Faster Algorithms for Quantitative Verification in Constant Treewidth Graphs.","venue":"CoRR","volume":"abs/1504.07384","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatterjeeIP15","ee":"http://arxiv.org/abs/1504.07384","url":"https://dblp.org/rec/journals/corr/ChatterjeeIP15"}, "url":"URL#3673679" }, { "@score":"1", "@id":"3673681", "info":{"authors":{"author":[{"@pid":"124/2773","text":"Moitreya Chatterjee"},{"@pid":"96/4225","text":"Anton Leuski"}]},"title":"An Active Learning Based Approach For Effective Video Annotation And Retrieval.","venue":"CoRR","volume":"abs/1504.07004","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatterjeeL15","ee":"http://arxiv.org/abs/1504.07004","url":"https://dblp.org/rec/journals/corr/ChatterjeeL15"}, "url":"URL#3673681" }, { "@score":"1", "@id":"3673690", "info":{"authors":{"author":[{"@pid":"54/3615","text":"Arkadev Chattopadhyay"},{"@pid":"04/4980","text":"Atri Rudra"}]},"title":"The Range of Topological Effects on Communication.","venue":"CoRR","volume":"abs/1504.06602","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChattopadhyayR15","ee":"http://arxiv.org/abs/1504.06602","url":"https://dblp.org/rec/journals/corr/ChattopadhyayR15"}, "url":"URL#3673690" }, { "@score":"1", "@id":"3673699", "info":{"authors":{"author":[{"@pid":"57/4418","text":"Symeon Chatzinotas"},{"@pid":"24/697","text":"Dimitrios Christopoulos"},{"@pid":"45/2903","text":"Björn E. Ottersten"}]},"title":"Cellular-Broadcast Service Convergence through Caching for CoMP Cloud RANs.","venue":"CoRR","volume":"abs/1504.08274","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChatzinotasCO15","ee":"http://arxiv.org/abs/1504.08274","url":"https://dblp.org/rec/journals/corr/ChatzinotasCO15"}, "url":"URL#3673699" }, { "@score":"1", "@id":"3673725", "info":{"authors":{"author":[{"@pid":"161/9971","text":"Manuel G. Chávez-Angeles"},{"@pid":"162/0219","text":"Patricia S. Sánchez-Medina"}]},"title":"Application of the war of attrition game to the analysis of intellectual property disputes.","venue":"CoRR","volume":"abs/1504.02511","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Chavez-AngelesS15","ee":"http://arxiv.org/abs/1504.02511","url":"https://dblp.org/rec/journals/corr/Chavez-AngelesS15"}, "url":"URL#3673725" }, { "@score":"1", "@id":"3673735", "info":{"authors":{"author":[{"@pid":"161/8929","text":"Tiben Che"},{"@pid":"148/9997-3","text":"Jingwei Xu 0003"},{"@pid":"c/GwanChoi","text":"Gwan S. Choi"}]},"title":"TC: Throughput Centric Successive Cancellation Decoder Hardware Implementation for Polar Codes.","venue":"CoRR","volume":"abs/1504.06247","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheXC15","ee":"http://arxiv.org/abs/1504.06247","url":"https://dblp.org/rec/journals/corr/CheXC15"}, "url":"URL#3673735" }, { "@score":"1", "@id":"3673745", "info":{"authors":{"author":[{"@pid":"82/3212","text":"Chandra Chekuri"},{"@pid":"86/10671","text":"Shalmoli Gupta"},{"@pid":"157/8351","text":"Kent Quanrud"}]},"title":"Streaming Algorithms for Submodular Function Maximization.","venue":"CoRR","volume":"abs/1504.08024","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChekuriGQ15","ee":"http://arxiv.org/abs/1504.08024","url":"https://dblp.org/rec/journals/corr/ChekuriGQ15"}, "url":"URL#3673745" }, { "@score":"1", "@id":"3673773", "info":{"authors":{"author":[{"@pid":"60/419-1","text":"Tianshi Chen 0001"},{"@pid":"132/4818","text":"Tohid Ardeshiri"},{"@pid":"18/10766","text":"Francesca P. Carli"},{"@pid":"79/4515","text":"Alessandro Chiuso"},{"@pid":"77/2831","text":"Lennart Ljung"},{"@pid":"82/2008","text":"Gianluigi Pillonetto"}]},"title":"Maximum entropy properties of discrete-time first-order stable spline kernel.","venue":"CoRR","volume":"abs/1504.03253","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenACCLP15","ee":"http://arxiv.org/abs/1504.03253","url":"https://dblp.org/rec/journals/corr/ChenACCLP15"}, "url":"URL#3673773" }, { "@score":"1", "@id":"3673777", "info":{"authors":{"author":[{"@pid":"191/4611","text":"Huaijin G. Chen"},{"@pid":"21/1910","text":"M. Salman Asif"},{"@pid":"68/4264","text":"Aswin C. Sankaranarayanan"},{"@pid":"84/858","text":"Ashok Veeraraghavan"}]},"title":"FPA-CS: Focal Plane Array-based Compressive Imaging in Short-wave Infrared.","venue":"CoRR","volume":"abs/1504.04085","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenASV15","ee":"http://arxiv.org/abs/1504.04085","url":"https://dblp.org/rec/journals/corr/ChenASV15"}, "url":"URL#3673777" }, { "@score":"1", "@id":"3673778", "info":{"authors":{"author":[{"@pid":"117/9359","text":"Niangjun Chen"},{"@pid":"161/9973","text":"Anish Agarwal"},{"@pid":"56/4447","text":"Adam Wierman"},{"@pid":"63/478","text":"Siddharth Barman"},{"@pid":"22/58","text":"Lachlan L. H. Andrew"}]},"title":"Online Convex Optimization Using Predictions.","venue":"CoRR","volume":"abs/1504.06681","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenAWBA15","ee":"http://arxiv.org/abs/1504.06681","url":"https://dblp.org/rec/journals/corr/ChenAWBA15"}, "url":"URL#3673778" }, { "@score":"1", "@id":"3673784", "info":{"authors":{"author":[{"@pid":"79/5815","text":"Yue Chen"},{"@pid":"57/3580","text":"Ana Busic"},{"@pid":"25/6516","text":"Sean P. Meyn"}]},"title":"State Estimation and Mean Field Control with Application to Demand Dispatch.","venue":"CoRR","volume":"abs/1504.00088","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenBM15","ee":"http://arxiv.org/abs/1504.00088","url":"https://dblp.org/rec/journals/corr/ChenBM15"}, "url":"URL#3673784" }, { "@score":"1", "@id":"3673786", "info":{"authors":{"author":[{"@pid":"69/510-1","text":"Tao Chen 0001"},{"@pid":"61/4460","text":"Rami Bahsoon"},{"@pid":"26/3646","text":"Xin Yao 0001"}]},"title":"Online QoS Modeling in the Cloud: A Hybrid and Adaptive Multi-Learners Approach.","venue":"CoRR","volume":"abs/1504.03961","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenBY15","ee":"http://arxiv.org/abs/1504.03961","url":"https://dblp.org/rec/journals/corr/ChenBY15"}, "url":"URL#3673786" }, { "@score":"1", "@id":"3673810", "info":{"authors":{"author":[{"@pid":"41/9922","text":"Xinlei Chen"},{"@pid":"06/2484-2","text":"Hao Fang 0002"},{"@pid":"47/8105","text":"Tsung-Yi Lin"},{"@pid":"154/6748","text":"Ramakrishna Vedantam"},{"@pid":"06/5843-1","text":"Saurabh Gupta 0001"},{"@pid":"62/750","text":"Piotr Dollár"},{"@pid":"10/6888","text":"C. Lawrence Zitnick"}]},"title":"Microsoft COCO Captions: Data Collection and Evaluation Server.","venue":"CoRR","volume":"abs/1504.00325","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenFLVGDZ15","ee":"http://arxiv.org/abs/1504.00325","url":"https://dblp.org/rec/journals/corr/ChenFLVGDZ15"}, "url":"URL#3673810" }, { "@score":"1", "@id":"3673821", "info":{"authors":{"author":[{"@pid":"143/5875","text":"Yongxin Chen"},{"@pid":"48/2652","text":"Tryphon T. Georgiou"},{"@pid":"74/8085","text":"Michele Pavon"}]},"title":"Steering state statistics with output feedback.","venue":"CoRR","volume":"abs/1504.00874","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenGP15c","ee":"http://arxiv.org/abs/1504.00874","url":"https://dblp.org/rec/journals/corr/ChenGP15c"}, "url":"URL#3673821" }, { "@score":"1", "@id":"3673825", "info":{"authors":{"author":[{"@pid":"39/8969","text":"Pin-Yu Chen"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Phase Transitions in Spectral Community Detection of Large Noisy Networks.","venue":"CoRR","volume":"abs/1504.02412","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenH15a","ee":"http://arxiv.org/abs/1504.02412","url":"https://dblp.org/rec/journals/corr/ChenH15a"}, "url":"URL#3673825" }, { "@score":"1", "@id":"3673848", "info":{"authors":{"author":[{"@pid":"60/419-1","text":"Tianshi Chen 0001"},{"@pid":"77/2831","text":"Lennart Ljung"}]},"title":"Regularized system identification using orthonormal basis functions.","venue":"CoRR","volume":"abs/1504.02872","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenL15","ee":"http://arxiv.org/abs/1504.02872","url":"https://dblp.org/rec/journals/corr/ChenL15"}, "url":"URL#3673848" }, { "@score":"1", "@id":"3673875", "info":{"authors":{"author":[{"@pid":"149/2606","text":"Tianran Chen"},{"@pid":"151/6660","text":"Dhagash Mehta"}]},"title":"An index-resolved fixed-point homotopy and potential energy landscapes.","venue":"CoRR","volume":"abs/1504.06622","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenM15d","ee":"http://arxiv.org/abs/1504.06622","url":"https://dblp.org/rec/journals/corr/ChenM15d"}, "url":"URL#3673875" }, { "@score":"1", "@id":"3673881", "info":{"authors":{"author":[{"@pid":"27/4364-17","text":"Jing Chen 0017"},{"@pid":"09/11461","text":"Samuel McCauley"},{"@pid":"124/3768-2","text":"Shikha Singh 0002"}]},"title":"Rational Proofs with Multiple Provers.","venue":"CoRR","volume":"abs/1504.08361","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenMS15","ee":"http://arxiv.org/abs/1504.08361","url":"https://dblp.org/rec/journals/corr/ChenMS15"}, "url":"URL#3673881" }, { "@score":"1", "@id":"3673900", "info":{"authors":{"author":[{"@pid":"117/9359","text":"Niangjun Chen"},{"@pid":"146/8107","text":"Xiaoqi Ren"},{"@pid":"60/4548","text":"Shaolei Ren"},{"@pid":"56/4447","text":"Adam Wierman"}]},"title":"Greening Multi-Tenant Data Center Demand Response.","venue":"CoRR","volume":"abs/1504.07308","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenRRW15","ee":"http://arxiv.org/abs/1504.07308","url":"https://dblp.org/rec/journals/corr/ChenRRW15"}, "url":"URL#3673900" }, { "@score":"1", "@id":"3673902", "info":{"authors":{"author":[{"@pid":"11/5123-2","text":"Yuxin Chen 0002"},{"@pid":"75/1420","text":"Changho Suh"}]},"title":"Spectral MLE: Top-$K$ Rank Aggregation from Pairwise Comparisons.","venue":"CoRR","volume":"abs/1504.07218","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenS15a","ee":"http://arxiv.org/abs/1504.07218","url":"https://dblp.org/rec/journals/corr/ChenS15a"}, "url":"URL#3673902" }, { "@score":"1", "@id":"3673910", "info":{"authors":{"author":[{"@pid":"11/5123-2","text":"Yuxin Chen 0002"},{"@pid":"75/1420","text":"Changho Suh"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea J. Goldsmith"}]},"title":"Information Recovery from Pairwise Measurements: A Shannon-Theoretic Approach.","venue":"CoRR","volume":"abs/1504.01369","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenSG15","ee":"http://arxiv.org/abs/1504.01369","url":"https://dblp.org/rec/journals/corr/ChenSG15"}, "url":"URL#3673910" }, { "@score":"1", "@id":"3673914", "info":{"authors":{"author":[{"@pid":"31/10201","text":"Xida Chen"},{"@pid":"46/3483","text":"Steve Sutphen"},{"@pid":"161/9803","text":"Paul Macoun"},{"@pid":"01/184","text":"Yee-Hong Yang"}]},"title":"Design and Implementation of a 3D Undersea Camera System.","venue":"CoRR","volume":"abs/1504.01753","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenSMY15","ee":"http://arxiv.org/abs/1504.01753","url":"https://dblp.org/rec/journals/corr/ChenSMY15"}, "url":"URL#3673914" }, { "@score":"1", "@id":"3673917", "info":{"authors":{"author":[{"@pid":"141/7670","text":"Sitan Chen"},{"@pid":"73/4025-2","text":"Thomas Steinke 0002"},{"@pid":"v/SPVadhan","text":"Salil P. Vadhan"}]},"title":"Pseudorandomness for Read-Once, Constant-Depth Circuits.","venue":"CoRR","volume":"abs/1504.04675","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenSV15","ee":"http://arxiv.org/abs/1504.04675","url":"https://dblp.org/rec/journals/corr/ChenSV15"}, "url":"URL#3673917" }, { "@score":"1", "@id":"3673919", "info":{"authors":{"author":[{"@pid":"153/3116-1","text":"Liang-Ting Chen 0001"},{"@pid":"131/2343","text":"Henning Urbat"}]},"title":"A Fibrational Approach to Automata Theory.","venue":"CoRR","volume":"abs/1504.02692","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenU15","ee":"http://arxiv.org/abs/1504.02692","url":"https://dblp.org/rec/journals/corr/ChenU15"}, "url":"URL#3673919" }, { "@score":"1", "@id":"3673921", "info":{"authors":{"author":[{"@pid":"136/4945","text":"Siheng Chen"},{"@pid":"160/8294","text":"Rohan Varma"},{"@pid":"64/5328","text":"Aarti Singh"},{"@pid":"k/JKovacevic","text":"Jelena Kovacevic"}]},"title":"Signal Recovery on Graphs: Random versus Experimentally Designed Sampling.","venue":"CoRR","volume":"abs/1504.05427","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenVSK15a","ee":"http://arxiv.org/abs/1504.05427","url":"https://dblp.org/rec/journals/corr/ChenVSK15a"}, "url":"URL#3673921" }, { "@score":"1", "@id":"3673930", "info":{"authors":{"author":[{"@pid":"117/4255","text":"Wenlin Chen"},{"@pid":"162/0025","text":"James T. Wilson"},{"@pid":"60/1032","text":"Stephen Tyree"},{"@pid":"88/4801","text":"Kilian Q. Weinberger"},{"@pid":"59/983-1","text":"Yixin Chen 0001"}]},"title":"Compressing Neural Networks with the Hashing Trick.","venue":"CoRR","volume":"abs/1504.04788","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenWTWC15","ee":"http://arxiv.org/abs/1504.04788","url":"https://dblp.org/rec/journals/corr/ChenWTWC15"}, "url":"URL#3673930" }, { "@score":"1", "@id":"3673934", "info":{"authors":{"author":[{"@pid":"161/9895","text":"Jijuan Chen"},{"@pid":"12/5838-5","text":"Tao Wang 0005"},{"@pid":"22/8550","text":"Huiqin Zhang"}]},"title":"Acyclic chromatic index of triangle-free 1-planar graphs.","venue":"CoRR","volume":"abs/1504.06234","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenWZ15","ee":"http://arxiv.org/abs/1504.06234","url":"https://dblp.org/rec/journals/corr/ChenWZ15"}, "url":"URL#3673934" }, { "@score":"1", "@id":"3673940", "info":{"authors":{"author":[{"@pid":"95/6450","text":"Badong Chen"},{"@pid":"82/2022-3","text":"Lei Xing 0003"},{"@pid":"16/2194","text":"Haiquan Zhao"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"},{"@pid":"p/JoseCPrincipe","text":"José C. Príncipe"}]},"title":"Generalized Correntropy for Robust Adaptive Filtering.","venue":"CoRR","volume":"abs/1504.02931","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenXZZP15","ee":"http://arxiv.org/abs/1504.02931","url":"https://dblp.org/rec/journals/corr/ChenXZZP15"}, "url":"URL#3673940" }, { "@score":"1", "@id":"3673963", "info":{"authors":{"author":[{"@pid":"72/2676-1","text":"Xiaoming Chen 0001"},{"@pid":"14/139","text":"Caijun Zhong"},{"@pid":"01/753","text":"Chau Yuen"},{"@pid":"41/2526","text":"Hsiao-Hwa Chen"}]},"title":"Multi-Antenna Relay Aided Wireless Physical Layer Security.","venue":"CoRR","volume":"abs/1504.02980","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChenZYC15","ee":"http://arxiv.org/abs/1504.02980","url":"https://dblp.org/rec/journals/corr/ChenZYC15"}, "url":"URL#3673963" }, { "@score":"1", "@id":"3673967", "info":{"authors":{"author":[{"@pid":"64/3701","text":"Chih-Hong Cheng"},{"@pid":"50/13","text":"Lacramioara Astefanoaei"},{"@pid":"143/2673","text":"Souha Ben Rayana"},{"@pid":"01/5624","text":"Saddek Bensalem"}]},"title":"Timed Orchestration for Component-based Systems.","venue":"CoRR","volume":"abs/1504.05513","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengARB15","ee":"http://arxiv.org/abs/1504.05513","url":"https://dblp.org/rec/journals/corr/ChengARB15"}, "url":"URL#3673967" }, { "@score":"1", "@id":"3673972", "info":{"authors":{"author":[{"@pid":"78/8039","text":"Justin Cheng"},{"@pid":"49/3976","text":"Cristian Danescu-Niculescu-Mizil"},{"@pid":"l/JureLeskovec","text":"Jure Leskovec"}]},"title":"Antisocial Behavior in Online Discussion Communities.","venue":"CoRR","volume":"abs/1504.00680","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChengDL15","ee":"http://arxiv.org/abs/1504.00680","url":"https://dblp.org/rec/journals/corr/ChengDL15"}, "url":"URL#3673972" }, { "@score":"1", "@id":"3673999", "info":{"authors":{"author":[{"@pid":"94/3017","text":"Mahdi Cheraghchi"},{"@pid":"i/PiotrIndyk","text":"Piotr Indyk"}]},"title":"Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform.","venue":"CoRR","volume":"abs/1504.07648","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CheraghchiI15","ee":"http://arxiv.org/abs/1504.07648","url":"https://dblp.org/rec/journals/corr/CheraghchiI15"}, "url":"URL#3673999" }, { "@score":"1", "@id":"3674034", "info":{"authors":{"author":[{"@pid":"76/5099","text":"Rayan Chikhi"},{"@pid":"95/4828","text":"Paul Medvedev"},{"@pid":"93/6920","text":"Martin Milanic"},{"@pid":"14/3654","text":"Sofya Raskhodnikova"}]},"title":"On the readability of overlap digraphs.","venue":"CoRR","volume":"abs/1504.04616","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChikhiMMR15","ee":"http://arxiv.org/abs/1504.04616","url":"https://dblp.org/rec/journals/corr/ChikhiMMR15"}, "url":"URL#3674034" }, { "@score":"1", "@id":"3674043", "info":{"authors":{"author":[{"@pid":"30/9135","text":"Giulio Chiribella"},{"@pid":"40/5746-2","text":"Xiao Yuan 0002"}]},"title":"Bridging the gap between general probabilistic theories and the device-independent framework for nonlocality and contextuality.","venue":"CoRR","volume":"abs/1504.02395","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChiribellaY15","ee":"http://arxiv.org/abs/1504.02395","url":"https://dblp.org/rec/journals/corr/ChiribellaY15"}, "url":"URL#3674043" }, { "@score":"1", "@id":"3674063", "info":{"authors":{"author":[{"@pid":"160/6954","text":"Hyunghoon Cho"},{"@pid":"b/BonnieBerger","text":"Bonnie Berger"},{"@pid":"29/4181-1","text":"Jian Peng 0001"}]},"title":"Diffusion Component Analysis: Unraveling Functional Topology in Biological Networks.","venue":"CoRR","volume":"abs/1504.02719","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoBP15","ee":"http://arxiv.org/abs/1504.02719","url":"https://dblp.org/rec/journals/corr/ChoBP15"}, "url":"URL#3674063" }, { "@score":"1", "@id":"3674065", "info":{"authors":{"author":[{"@pid":"70/3243","text":"Hyungmin Cho"},{"@pid":"38/4501","text":"Chen-Yong Cher"},{"@pid":"162/0221","text":"Thomas Shepherd"},{"@pid":"30/4561","text":"Subhasish Mitra"}]},"title":"Understanding Soft Errors in Uncore Components.","venue":"CoRR","volume":"abs/1504.01381","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoCSM15","ee":"http://arxiv.org/abs/1504.01381","url":"https://dblp.org/rec/journals/corr/ChoCSM15"}, "url":"URL#3674065" }, { "@score":"1", "@id":"3674076", "info":{"authors":{"author":{"@pid":"04/8611","text":"Wongun Choi"}},"title":"Near-Online Multi-target Tracking with Aggregated Local Flow Descriptor.","venue":"CoRR","volume":"abs/1504.02340","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Choi15","ee":"http://arxiv.org/abs/1504.02340","url":"https://dblp.org/rec/journals/corr/Choi15"}, "url":"URL#3674076" }, { "@score":"1", "@id":"3674080", "info":{"authors":{"author":[{"@pid":"67/1972","text":"Arthur Choi"},{"@pid":"p/ADarwiche","text":"Adnan Darwiche"}]},"title":"Dual Decomposition from the Perspective of Relax, Compensate and then Recover.","venue":"CoRR","volume":"abs/1504.01173","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoiD15","ee":"http://arxiv.org/abs/1504.01173","url":"https://dblp.org/rec/journals/corr/ChoiD15"}, "url":"URL#3674080" }, { "@score":"1", "@id":"3674097", "info":{"authors":{"author":{"@pid":"78/11411","text":"Krzysztof Choromanski"}},"title":"Learning how to rank from heavily perturbed statistics - digraph clustering approach.","venue":"CoRR","volume":"abs/1504.01118","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Choromanski15","ee":"http://arxiv.org/abs/1504.01118","url":"https://dblp.org/rec/journals/corr/Choromanski15"}, "url":"URL#3674097" }, { "@score":"1", "@id":"3674099", "info":{"authors":{"author":[{"@pid":"78/11411","text":"Krzysztof Choromanski"},{"@pid":"43/4734","text":"Tony Jebara"}]},"title":"Coloring tournaments with forbidden substructures.","venue":"CoRR","volume":"abs/1504.01119","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoromanskiJ15","ee":"http://arxiv.org/abs/1504.01119","url":"https://dblp.org/rec/journals/corr/ChoromanskiJ15"}, "url":"URL#3674099" }, { "@score":"1", "@id":"3674101", "info":{"authors":{"author":[{"@pid":"78/11411","text":"Krzysztof Choromanski"},{"@pid":"97/4479","text":"Afshin Rostamizadeh"},{"@pid":"75/1894","text":"Umar Syed"}]},"title":"An $\\tilde{O}(\\frac{1}{\\sqrt{T}})$-error online algorithm for retrieving heavily perturbated statistical databases in the low-dimensional querying mode.","venue":"CoRR","volume":"abs/1504.01117","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChoromanskiRS15","ee":"http://arxiv.org/abs/1504.01117","url":"https://dblp.org/rec/journals/corr/ChoromanskiRS15"}, "url":"URL#3674101" }, { "@score":"1", "@id":"3674123", "info":{"authors":{"author":[{"@pid":"132/1826","text":"Iffat Chowdhury"},{"@pid":"20/292","text":"Matt Gibson 0001"}]},"title":"A Characterization of Consistent Digital Line Segments in Two Dimensions.","venue":"CoRR","volume":"abs/1504.07661","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChowdhuryG15","ee":"http://arxiv.org/abs/1504.07661","url":"https://dblp.org/rec/journals/corr/ChowdhuryG15"}, "url":"URL#3674123" }, { "@score":"1", "@id":"3674145", "info":{"authors":{"author":[{"@pid":"62/8117","text":"Meng-Che Chuang"},{"@pid":"78/4381","text":"Jenq-Neng Hwang"},{"@pid":"31/10697","text":"Kresimir Williams"},{"@pid":"84/10699","text":"Richard Towler"}]},"title":"Tracking Live Fish from Low-Contrast and Low-Frame-Rate Stereo Videos.","venue":"CoRR","volume":"abs/1504.03811","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChuangHWT15","ee":"http://arxiv.org/abs/1504.03811","url":"https://dblp.org/rec/journals/corr/ChuangHWT15"}, "url":"URL#3674145" }, { "@score":"1", "@id":"3674149", "info":{"authors":{"author":[{"@pid":"70/4508","text":"Maria Chudnovsky"},{"@pid":"97/9859","text":"Jan Goedgebeur"},{"@pid":"83/8685","text":"Oliver Schaudt"},{"@pid":"149/2398","text":"Mingxian Zhong"}]},"title":"Obstructions for three-coloring graphs without induced paths on six vertices.","venue":"CoRR","volume":"abs/1504.06979","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ChudnovskyGSZ15","ee":"http://arxiv.org/abs/1504.06979","url":"https://dblp.org/rec/journals/corr/ChudnovskyGSZ15"}, "url":"URL#3674149" }, { "@score":"1", "@id":"3674196", "info":{"authors":{"author":[{"@pid":"88/10332","text":"Carlo Ciliberto"},{"@pid":"119/4873","text":"Youssef Mroueh"},{"@pid":"12/5544","text":"Tomaso A. Poggio"},{"@pid":"01/6788","text":"Lorenzo Rosasco"}]},"title":"Convex Learning of Multiple Tasks and their Structure.","venue":"CoRR","volume":"abs/1504.03101","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CilibertoMPR15","ee":"http://arxiv.org/abs/1504.03101","url":"https://dblp.org/rec/journals/corr/CilibertoMPR15"}, "url":"URL#3674196" }, { "@score":"1", "@id":"3674197", "info":{"authors":{"author":[{"@pid":"88/10332","text":"Carlo Ciliberto"},{"@pid":"01/6788","text":"Lorenzo Rosasco"},{"@pid":"18/8186","text":"Silvia Villa"}]},"title":"Learning Multiple Visual Tasks while Discovering their Structure.","venue":"CoRR","volume":"abs/1504.03106","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CilibertoRV15","ee":"http://arxiv.org/abs/1504.03106","url":"https://dblp.org/rec/journals/corr/CilibertoRV15"}, "url":"URL#3674197" }, { "@score":"1", "@id":"3674205", "info":{"authors":{"author":[{"@pid":"51/7601","text":"Renato J. Cintra"},{"@pid":"130/6194","text":"Hélio M. de Oliveira"}]},"title":"A Short Survey on Arithmetic Transforms and the Arithmetic Hartley Transform.","venue":"CoRR","volume":"abs/1504.06106","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CintraO15","ee":"http://arxiv.org/abs/1504.06106","url":"https://dblp.org/rec/journals/corr/CintraO15"}, "url":"URL#3674205" }, { "@score":"1", "@id":"3674226", "info":{"authors":{"author":[{"@pid":"142/2414","text":"Marc Claesen"},{"@pid":"d/JesseDavis","text":"Jesse Davis"},{"@pid":"58/1074","text":"Frank De Smet"},{"@pid":"66/3559","text":"Bart De Moor"}]},"title":"Assessing binary classifiers using only positive and unlabeled data.","venue":"CoRR","volume":"abs/1504.06837","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClaesenDSM15","ee":"http://arxiv.org/abs/1504.06837","url":"https://dblp.org/rec/journals/corr/ClaesenDSM15"}, "url":"URL#3674226" }, { "@score":"1", "@id":"3674228", "info":{"authors":{"author":[{"@pid":"142/2414","text":"Marc Claesen"},{"@pid":"58/1074","text":"Frank De Smet"},{"@pid":"161/9841","text":"Pieter Gillard"},{"@pid":"161/9918","text":"Chantal Mathieu"},{"@pid":"66/3559","text":"Bart De Moor"}]},"title":"Building Classifiers to Predict the Start of Glucose-Lowering Pharmacotherapy Using Belgian Health Expenditure Data.","venue":"CoRR","volume":"abs/1504.07389","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClaesenSGMM15","ee":"http://arxiv.org/abs/1504.07389","url":"https://dblp.org/rec/journals/corr/ClaesenSGMM15"}, "url":"URL#3674228" }, { "@score":"1", "@id":"3674247", "info":{"authors":{"author":[{"@pid":"94/8295","text":"Lorenzo Clemente"},{"@pid":"97/3803","text":"Slawomir Lasota 0001"}]},"title":"Reachability analysis of first-order definable pushdown systems.","venue":"CoRR","volume":"abs/1504.02651","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClementeL15a","ee":"http://arxiv.org/abs/1504.02651","url":"https://dblp.org/rec/journals/corr/ClementeL15a"}, "url":"URL#3674247" }, { "@score":"1", "@id":"3674249", "info":{"authors":{"author":[{"@pid":"94/8295","text":"Lorenzo Clemente"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Multidimensional beyond worst-case and almost-sure problems for mean-payoff objectives.","venue":"CoRR","volume":"abs/1504.08211","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClementeR15","ee":"http://arxiv.org/abs/1504.08211","url":"https://dblp.org/rec/journals/corr/ClementeR15"}, "url":"URL#3674249" }, { "@score":"1", "@id":"3674254", "info":{"authors":{"author":[{"@pid":"c/RaphaelClifford","text":"Raphaël Clifford"},{"@pid":"139/8186","text":"Allyx Fontaine"},{"@pid":"02/836","text":"Ely Porat"},{"@pid":"14/2490","text":"Benjamin Sach"},{"@pid":"99/3746","text":"Tatiana Starikovskaya"}]},"title":"Dictionary matching in a stream.","venue":"CoRR","volume":"abs/1504.06242","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CliffordFPSS15","ee":"http://arxiv.org/abs/1504.06242","url":"https://dblp.org/rec/journals/corr/CliffordFPSS15"}, "url":"URL#3674254" }, { "@score":"1", "@id":"3674256", "info":{"authors":{"author":[{"@pid":"c/RaphaelClifford","text":"Raphaël Clifford"},{"@pid":"48/481","text":"Allan Grønlund Jørgensen"},{"@pid":"07/6242","text":"Kasper Green Larsen"}]},"title":"New Unconditional Hardness Results for Dynamic and Online Problems.","venue":"CoRR","volume":"abs/1504.01836","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CliffordJL15","ee":"http://arxiv.org/abs/1504.01836","url":"https://dblp.org/rec/journals/corr/CliffordJL15"}, "url":"URL#3674256" }, { "@score":"1", "@id":"3674257", "info":{"authors":{"author":[{"@pid":"c/RaphaelClifford","text":"Raphaël Clifford"},{"@pid":"13/5557","text":"Markus Jalsenius"},{"@pid":"14/2490","text":"Benjamin Sach"}]},"title":"The complexity of computation in bit streams.","venue":"CoRR","volume":"abs/1504.00834","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CliffordJS15","ee":"http://arxiv.org/abs/1504.00834","url":"https://dblp.org/rec/journals/corr/CliffordJS15"}, "url":"URL#3674257" }, { "@score":"1", "@id":"3674258", "info":{"authors":{"author":[{"@pid":"161/9820","text":"T. Clingman"},{"@pid":"162/0046","text":"Jeff Murugan"},{"@pid":"161/9917","text":"Jonathan P. Shock"}]},"title":"Probability Density Functions from the Fisher Information Metric.","venue":"CoRR","volume":"abs/1504.03184","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ClingmanMS15","ee":"http://arxiv.org/abs/1504.03184","url":"https://dblp.org/rec/journals/corr/ClingmanMS15"}, "url":"URL#3674258" }, { "@score":"1", "@id":"3674288", "info":{"authors":{"author":[{"@pid":"97/1359","text":"Rami Cohen"},{"@pid":"50/8860","text":"Yuval Cassuto"}]},"title":"Algorithms and Throughput Analysis for MDS-Coded Switches.","venue":"CoRR","volume":"abs/1504.04803","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenC15","ee":"http://arxiv.org/abs/1504.04803","url":"https://dblp.org/rec/journals/corr/CohenC15"}, "url":"URL#3674288" }, { "@score":"1", "@id":"3674291", "info":{"authors":{"author":[{"@pid":"50/3733","text":"David A. Cohen"},{"@pid":"c/JasonCrampton","text":"Jason Crampton"},{"@pid":"73/5299","text":"Andrei V. Gagarin"},{"@pid":"74/2412","text":"Gregory Z. Gutin"},{"@pid":"35/4186-1","text":"Mark Jones 0001"}]},"title":"Algorithms for the workflow satisfiability problem engineered for counting constraints.","venue":"CoRR","volume":"abs/1504.02420","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenCGGJ15","ee":"http://arxiv.org/abs/1504.02420","url":"https://dblp.org/rec/journals/corr/CohenCGGJ15"}, "url":"URL#3674291" }, { "@score":"1", "@id":"3674295", "info":{"authors":{"author":[{"@pid":"130/0602","text":"Ilan Reuven Cohen"},{"@pid":"157/6064","text":"Alon Eden"},{"@pid":"06/894","text":"Amos Fiat"},{"@pid":"09/813","text":"Lukasz Jez"}]},"title":"Pricing Online Decisions: Beyond Auctions.","venue":"CoRR","volume":"abs/1504.01093","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenEFJ15","ee":"http://arxiv.org/abs/1504.01093","url":"https://dblp.org/rec/journals/corr/CohenEFJ15"}, "url":"URL#3674295" }, { "@score":"1", "@id":"3674297", "info":{"authors":{"author":[{"@pid":"04/5629","text":"Shay B. Cohen"},{"@pid":"51/844","text":"Daniel Gildea"}]},"title":"Parsing Linear-Context Free Rewriting Systems with Fast Matrix Multiplication.","venue":"CoRR","volume":"abs/1504.08342","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CohenG15","ee":"http://arxiv.org/abs/1504.08342","url":"https://dblp.org/rec/journals/corr/CohenG15"}, "url":"URL#3674297" }, { "@score":"1", "@id":"3674326", "info":{"authors":{"author":[{"@pid":"139/3426","text":"Michele Colledanchise"},{"@pid":"118/0083","text":"Ramviyas Parasuraman"},{"@pid":"54/5425","text":"Petter Ögren"}]},"title":"Learning of Behavior Trees for Autonomous Agents.","venue":"CoRR","volume":"abs/1504.05811","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ColledanchisePO15","ee":"http://arxiv.org/abs/1504.05811","url":"https://dblp.org/rec/journals/corr/ColledanchisePO15"}, "url":"URL#3674326" }, { "@score":"1", "@id":"3674346", "info":{"authors":{"author":[{"@pid":"115/7779","text":"Filipe Condessa"},{"@pid":"35/4893","text":"José M. Bioucas-Dias"},{"@pid":"k/JKovacevic","text":"Jelena Kovacevic"}]},"title":"SegSALSA-STR: A convex formulation to supervised hyperspectral image segmentation using hidden fields and structure tensor regularization.","venue":"CoRR","volume":"abs/1504.07028","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CondessaBK15","ee":"http://arxiv.org/abs/1504.07028","url":"https://dblp.org/rec/journals/corr/CondessaBK15"}, "url":"URL#3674346" }, { "@score":"1", "@id":"3674347", "info":{"authors":{"author":[{"@pid":"115/7779","text":"Filipe Condessa"},{"@pid":"35/4893","text":"José M. Bioucas-Dias"},{"@pid":"k/JKovacevic","text":"Jelena Kovacevic"}]},"title":"Robust hyperspectral image classification with rejection fields.","venue":"CoRR","volume":"abs/1504.07918","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CondessaBK15a","ee":"http://arxiv.org/abs/1504.07918","url":"https://dblp.org/rec/journals/corr/CondessaBK15a"}, "url":"URL#3674347" }, { "@score":"1", "@id":"3674348", "info":{"authors":{"author":[{"@pid":"115/7779","text":"Filipe Condessa"},{"@pid":"k/JKovacevic","text":"Jelena Kovacevic"},{"@pid":"35/4893","text":"José M. Bioucas-Dias"}]},"title":"Performance measures for classification systems with rejection.","venue":"CoRR","volume":"abs/1504.02763","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CondessaKB15","ee":"http://arxiv.org/abs/1504.02763","url":"https://dblp.org/rec/journals/corr/CondessaKB15"}, "url":"URL#3674348" }, { "@score":"1", "@id":"3674369", "info":{"authors":{"author":[{"@pid":"23/2763","text":"Joshua N. Cooper"},{"@pid":"151/6478","text":"Danny Rorabaugh"}]},"title":"Density dichotomy in random words.","venue":"CoRR","volume":"abs/1504.04424","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CooperR15","ee":"http://arxiv.org/abs/1504.04424","url":"https://dblp.org/rec/journals/corr/CooperR15"}, "url":"URL#3674369" }, { "@score":"1", "@id":"3674372", "info":{"authors":{"author":[{"@pid":"46/8705","text":"Florin Coras"},{"@pid":"91/1044","text":"Jordi Domingo-Pascual"},{"@pid":"42/2223","text":"Albert Cabellos-Aparicio"}]},"title":"On the Scalability of LISP Mappings Caches.","venue":"CoRR","volume":"abs/1504.03004","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CorasDC15","ee":"http://arxiv.org/abs/1504.03004","url":"https://dblp.org/rec/journals/corr/CorasDC15"}, "url":"URL#3674372" }, { "@score":"1", "@id":"3674378", "info":{"authors":{"author":[{"@pid":"c/GVCormack","text":"Gordon V. Cormack"},{"@pid":"122/5875","text":"Maura R. Grossman"}]},"title":"Autonomy and Reliability of Continuous Active Learning for Technology-Assisted Review.","venue":"CoRR","volume":"abs/1504.06868","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CormackG15","ee":"http://arxiv.org/abs/1504.06868","url":"https://dblp.org/rec/journals/corr/CormackG15"}, "url":"URL#3674378" }, { "@score":"1", "@id":"3674382", "info":{"authors":{"author":[{"@pid":"137/3340","text":"Cristina Cornelio"},{"@pid":"127/7332","text":"Andrea Loreggia"},{"@pid":"s/VijayASaraswat","text":"Vijay A. Saraswat"}]},"title":"Logical Conditional Preference Theories.","venue":"CoRR","volume":"abs/1504.06374","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CornelioLS15","ee":"http://arxiv.org/abs/1504.06374","url":"https://dblp.org/rec/journals/corr/CornelioLS15"}, "url":"URL#3674382" }, { "@score":"1", "@id":"3674383", "info":{"authors":{"author":[{"@pid":"122/3039","text":"Kamiel Cornelissen"},{"@pid":"m/BodoManthey","text":"Bodo Manthey"}]},"title":"Smoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm.","venue":"CoRR","volume":"abs/1504.08251","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CornelissenM15","ee":"http://arxiv.org/abs/1504.08251","url":"https://dblp.org/rec/journals/corr/CornelissenM15"}, "url":"URL#3674383" }, { "@score":"1", "@id":"3674395", "info":{"authors":{"author":[{"@pid":"37/5590","text":"Gianna M. Del Corso"},{"@pid":"40/6535","text":"Francesco Romani"}]},"title":"A multi-class approach for ranking graph nodes: models and experiments with incomplete data.","venue":"CoRR","volume":"abs/1504.07766","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CorsoR15","ee":"http://arxiv.org/abs/1504.07766","url":"https://dblp.org/rec/journals/corr/CorsoR15"}, "url":"URL#3674395" }, { "@score":"1", "@id":"3674407", "info":{"authors":{"author":[{"@pid":"162/0111","text":"Eduardo Chinelate Costa"},{"@pid":"02/4387","text":"Alex Borges Vieira"},{"@pid":"49/9059","text":"Klaus Wehmuth"},{"@pid":"47/772","text":"Artur Ziviani"},{"@pid":"47/2795","text":"Ana Paula Couto da Silva"}]},"title":"Time Centrality in Dynamic Complex Networks.","venue":"CoRR","volume":"abs/1504.00241","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CostaVWZS15","ee":"http://arxiv.org/abs/1504.00241","url":"https://dblp.org/rec/journals/corr/CostaVWZS15"}, "url":"URL#3674407" }, { "@score":"1", "@id":"3674440", "info":{"authors":{"author":[{"@pid":"161/9990","text":"Wesley Cowan"},{"@pid":"01/1804","text":"Michael N. Katehakis"}]},"title":"Normal Bandits of Unknown Means and Variances: Asymptotic Optimality, Finite Horizon Regret Bounds, and a Solution to an Open Problem.","venue":"CoRR","volume":"abs/1504.05823","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CowanK15","ee":"http://arxiv.org/abs/1504.05823","url":"https://dblp.org/rec/journals/corr/CowanK15"}, "url":"URL#3674440" }, { "@score":"1", "@id":"3674444", "info":{"authors":{"author":[{"@pid":"132/9046","text":"Emanuele Cozzo"},{"@pid":"74/9058","text":"Guilherme Ferraz de Arruda"},{"@pid":"25/11141","text":"Francisco Aparecido Rodrigues"},{"@pid":"46/5859","text":"Yamir Moreno"}]},"title":"Multilayer networks: metrics and spectral properties.","venue":"CoRR","volume":"abs/1504.05567","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CozzoARM15","ee":"http://arxiv.org/abs/1504.05567","url":"https://dblp.org/rec/journals/corr/CozzoARM15"}, "url":"URL#3674444" }, { "@score":"1", "@id":"3674452", "info":{"authors":{"author":[{"@pid":"c/JasonCrampton","text":"Jason Crampton"},{"@pid":"73/5299","text":"Andrei V. Gagarin"},{"@pid":"74/2412","text":"Gregory Z. Gutin"},{"@pid":"35/4186-1","text":"Mark Jones 0001"}]},"title":"On the Workflow Satisfiability Problem with Class-Independent Constraints.","venue":"CoRR","volume":"abs/1504.03561","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CramptonGGJ15","ee":"http://arxiv.org/abs/1504.03561","url":"https://dblp.org/rec/journals/corr/CramptonGGJ15"}, "url":"URL#3674452" }, { "@score":"1", "@id":"3674464", "info":{"authors":{"author":[{"@pid":"29/5052","text":"Tom Crick"},{"@pid":"54/10998","text":"Benjamin A. Hall"},{"@pid":"49/5100","text":"Samin Ishtiaq"}]},"title":"Reproducibility as a Technical Specification.","venue":"CoRR","volume":"abs/1504.01310","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CrickHI15a","ee":"http://arxiv.org/abs/1504.01310","url":"https://dblp.org/rec/journals/corr/CrickHI15a"}, "url":"URL#3674464" }, { "@score":"1", "@id":"3674466", "info":{"authors":{"author":[{"@pid":"19/11144","text":"Irene Crimaldi"},{"@pid":"151/6677","text":"Michela Del Vicario"},{"@pid":"29/8656","text":"Greg Morrison"},{"@pid":"60/5184","text":"Walter Quattrociocchi"},{"@pid":"54/10140","text":"Massimo Riccaboni"}]},"title":"Homophily and Triadic Closure in Evolving Social Networks.","venue":"CoRR","volume":"abs/1504.07101","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CrimaldiVMQR15","ee":"http://arxiv.org/abs/1504.07101","url":"https://dblp.org/rec/journals/corr/CrimaldiVMQR15"}, "url":"URL#3674466" }, { "@score":"1", "@id":"3674482", "info":{"authors":{"author":[{"@pid":"16/6123","text":"James P. Crutchfield"},{"@pid":"143/7392","text":"Sarah Marzen"}]},"title":"Signatures of Infinity: Nonergodicity and Resource Scaling in Prediction, Complexity, and Learning.","venue":"CoRR","volume":"abs/1504.00386","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CrutchfieldM15","ee":"http://arxiv.org/abs/1504.00386","url":"https://dblp.org/rec/journals/corr/CrutchfieldM15"}, "url":"URL#3674482" }, { "@score":"1", "@id":"3674504", "info":{"authors":{"author":[{"@pid":"75/2655","text":"Endre Csóka"},{"@pid":"161/9794","text":"Szabolcs Mészáros"}]},"title":"Several Tokens in Herman's algorithm.","venue":"CoRR","volume":"abs/1504.06963","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CsokaM15","ee":"http://arxiv.org/abs/1504.06963","url":"https://dblp.org/rec/journals/corr/CsokaM15"}, "url":"URL#3674504" }, { "@score":"1", "@id":"3674507", "info":{"authors":{"author":{"@pid":"58/6857","text":"Mihai Cucuringu"}},"title":"Sync-Rank: Robust Ranking, Constrained Ranking and Rank Aggregation via Eigenvector and Semidefinite Programming Synchronization.","venue":"CoRR","volume":"abs/1504.01070","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cucuringu15","ee":"http://arxiv.org/abs/1504.01070","url":"https://dblp.org/rec/journals/corr/Cucuringu15"}, "url":"URL#3674507" }, { "@score":"1", "@id":"3674508", "info":{"authors":{"author":{"@pid":"58/6857","text":"Mihai Cucuringu"}},"title":"Synchronization over Z2 and community detection in multiplex signed networks with constraints.","venue":"CoRR","volume":"abs/1504.04061","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cucuringu15a","ee":"http://arxiv.org/abs/1504.04061","url":"https://dblp.org/rec/journals/corr/Cucuringu15a"}, "url":"URL#3674508" }, { "@score":"1", "@id":"3674509", "info":{"authors":{"author":[{"@pid":"58/6857","text":"Mihai Cucuringu"},{"@pid":"10/4780","text":"Radek Erban"}]},"title":"ADM-CLE approach for detecting slow variables in continuous time Markov chains and dynamic data.","venue":"CoRR","volume":"abs/1504.01786","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CucuringuE15","ee":"http://arxiv.org/abs/1504.01786","url":"https://dblp.org/rec/journals/corr/CucuringuE15"}, "url":"URL#3674509" }, { "@score":"1", "@id":"3674511", "info":{"authors":{"author":{"@pid":"31/891-8","text":"Peng Cui 0008"}},"title":"Refuting Unique Game Conjecture.","venue":"CoRR","volume":"abs/1504.00442","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Cui15","ee":"http://arxiv.org/abs/1504.00442","url":"https://dblp.org/rec/journals/corr/Cui15"}, "url":"URL#3674511" }, { "@score":"1", "@id":"3674559", "info":{"authors":{"author":[{"@pid":"76/819","text":"Marek Cygan"},{"@pid":"140/7314","text":"Jakub Pachocki"},{"@pid":"135/6361","text":"Arkadiusz Socala"}]},"title":"The Hardness of Subgraph Isomorphism.","venue":"CoRR","volume":"abs/1504.02876","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CyganPS15","ee":"http://arxiv.org/abs/1504.02876","url":"https://dblp.org/rec/journals/corr/CyganPS15"}, "url":"URL#3674559" }, { "@score":"1", "@id":"3674562", "info":{"authors":{"author":{"@pid":"43/8484-1","text":"Wojciech Marian Czarnecki"}},"title":"On the consistency of Multithreshold Entropy Linear Classifier.","venue":"CoRR","volume":"abs/1504.04740","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Czarnecki15","ee":"http://arxiv.org/abs/1504.04740","url":"https://dblp.org/rec/journals/corr/Czarnecki15"}, "url":"URL#3674562" }, { "@score":"1", "@id":"3674563", "info":{"authors":{"author":[{"@pid":"43/8484-1","text":"Wojciech Marian Czarnecki"},{"@pid":"162/0003","text":"Rafal Józefowicz"},{"@pid":"31/5172","text":"Jacek Tabor"}]},"title":"Maximum Entropy Linear Manifold for Learning Discriminative Low-dimensional Representation.","venue":"CoRR","volume":"abs/1504.02622","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CzarneckiJT15","ee":"http://arxiv.org/abs/1504.02622","url":"https://dblp.org/rec/journals/corr/CzarneckiJT15"}, "url":"URL#3674563" }, { "@score":"1", "@id":"3674573", "info":{"authors":{"author":[{"@pid":"c/ArturCzumaj","text":"Artur Czumaj"},{"@pid":"08/9919-1","text":"Pan Peng 0001"},{"@pid":"47/2482","text":"Christian Sohler"}]},"title":"Testing Cluster Structure of Graphs.","venue":"CoRR","volume":"abs/1504.03294","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/CzumajPS15","ee":"http://arxiv.org/abs/1504.03294","url":"https://dblp.org/rec/journals/corr/CzumajPS15"}, "url":"URL#3674573" }, { "@score":"1", "@id":"3674582", "info":{"authors":{"author":[{"@pid":"94/9528","text":"Fabio D'Andreagiovanni"},{"@pid":"161/9842","text":"Antonella Nardin"}]},"title":"Towards the fast and robust optimal design of Wireless Body Area Networks.","venue":"CoRR","volume":"abs/1504.01356","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DAndreagiovanni15","ee":"http://arxiv.org/abs/1504.01356","url":"https://dblp.org/rec/journals/corr/DAndreagiovanni15"}, "url":"URL#3674582" }, { "@score":"1", "@id":"3674599", "info":{"authors":{"author":[{"@pid":"146/0751","text":"Przemyslaw Daca"},{"@pid":"h/ThomasAHenzinger","text":"Thomas A. Henzinger"},{"@pid":"95/6511","text":"Jan Kretínský"},{"@pid":"74/255","text":"Tatjana Petrov"}]},"title":"Faster Statistical Model Checking for Unbounded Temporal Properties.","venue":"CoRR","volume":"abs/1504.05739","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DacaHKP15","ee":"http://arxiv.org/abs/1504.05739","url":"https://dblp.org/rec/journals/corr/DacaHKP15"}, "url":"URL#3674599" }, { "@score":"1", "@id":"3674601", "info":{"authors":{"author":[{"@pid":"162/0106","text":"Z. I. Dafalla"},{"@pid":"130/3712","text":"R. D. Balaji"}]},"title":"Enhancing the Understanding of Computer Networking Courses through Software Tools.","venue":"CoRR","volume":"abs/1504.02093","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DafallaB15","ee":"http://arxiv.org/abs/1504.02093","url":"https://dblp.org/rec/journals/corr/DafallaB15"}, "url":"URL#3674601" }, { "@score":"1", "@id":"3674644", "info":{"authors":{"author":[{"@pid":"162/0171","text":"Simone Daminelli"},{"@pid":"162/0134","text":"Josephine Maria Thomas"},{"@pid":"162/0116","text":"Claudio Durán"},{"@pid":"54/8711","text":"Carlo Vittorio Cannistraci"}]},"title":"Common neighbours and the local-community-paradigm for topological link prediction in bipartite networks.","venue":"CoRR","volume":"abs/1504.07011","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaminelliTDC15","ee":"http://arxiv.org/abs/1504.07011","url":"https://dblp.org/rec/journals/corr/DaminelliTDC15"}, "url":"URL#3674644" }, { "@score":"1", "@id":"3674651", "info":{"authors":{"author":[{"@pid":"50/6845","text":"Varsha Dani"},{"@pid":"29/7674","text":"Mahnush Movahedi"},{"@pid":"72/2042","text":"Jared Saia"},{"@pid":"01/89","text":"Maxwell Young"}]},"title":"Interactive Communication with Unknown Noise Rate.","venue":"CoRR","volume":"abs/1504.06316","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaniMSY15","ee":"http://arxiv.org/abs/1504.06316","url":"https://dblp.org/rec/journals/corr/DaniMSY15"}, "url":"URL#3674651" }, { "@score":"1", "@id":"3674657", "info":{"authors":{"author":{"@pid":"151/6459","text":"Kwetishe Joro Danjuma"}},"title":"Performance Evaluation of Machine Learning Algorithms in Post-operative Life Expectancy in the Lung Cancer Patients.","venue":"CoRR","volume":"abs/1504.04646","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Danjuma15","ee":"http://arxiv.org/abs/1504.04646","url":"https://dblp.org/rec/journals/corr/Danjuma15"}, "url":"URL#3674657" }, { "@score":"1", "@id":"3674659", "info":{"authors":{"author":[{"@pid":"151/6459","text":"Kwetishe Joro Danjuma"},{"@pid":"162/0032","text":"Bayo Mohammed Onimode"},{"@pid":"161/9782","text":"Ochedikwu Jonah Onche"}]},"title":"Gender Issues & Information Communication Technology for Development (ICT4D): Prospects and Challenges for Women in Nigeria.","venue":"CoRR","volume":"abs/1504.04644","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DanjumaOO15","ee":"http://arxiv.org/abs/1504.04644","url":"https://dblp.org/rec/journals/corr/DanjumaOO15"}, "url":"URL#3674659" }, { "@score":"1", "@id":"3674662", "info":{"authors":{"author":{"@pid":"162/0163","text":"Maria Angeles Dano-Hinosolango"}},"title":"Sharpening Skills in Using Presentation Tools: Students' Experiences.","venue":"CoRR","volume":"abs/1504.02790","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dano-Hinosolango15","ee":"http://arxiv.org/abs/1504.02790","url":"https://dblp.org/rec/journals/corr/Dano-Hinosolango15"}, "url":"URL#3674662" }, { "@score":"1", "@id":"3674702", "info":{"authors":{"author":[{"@pid":"161/9896","text":"Arabinda Dash"},{"@pid":"162/0048","text":"Sujaya Kumar Sathua"}]},"title":"High Density Noise Removal by Cascading Algorithms.","venue":"CoRR","volume":"abs/1504.02856","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DashS15","ee":"http://arxiv.org/abs/1504.02856","url":"https://dblp.org/rec/journals/corr/DashS15"}, "url":"URL#3674702" }, { "@score":"1", "@id":"3674706", "info":{"authors":{"author":[{"@pid":"134/6614","text":"Zolzaya Dashdorj"},{"@pid":"133/8494","text":"Stanislav Sobolevsky"},{"@pid":"s/LucianoSerafini","text":"Luciano Serafini"},{"@pid":"51/6763","text":"Fabrizio Antonelli"},{"@pid":"00/5561","text":"Carlo Ratti"}]},"title":"Semantic Enrichment of Mobile Phone Data Records Using Background Knowledge.","venue":"CoRR","volume":"abs/1504.05895","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DashdorjSSAR15","ee":"http://arxiv.org/abs/1504.05895","url":"https://dblp.org/rec/journals/corr/DashdorjSSAR15"}, "url":"URL#3674706" }, { "@score":"1", "@id":"3674710", "info":{"authors":{"author":[{"@pid":"d/ConstantinosDaskalakis","text":"Constantinos Daskalakis"},{"@pid":"73/11140","text":"Gautam Kamath 0001"},{"@pid":"79/8819","text":"Christos Tzamos"}]},"title":"On the Structure, Covering, and Learning of Poisson Multinomial Distributions.","venue":"CoRR","volume":"abs/1504.08363","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DaskalakisKT15","ee":"http://arxiv.org/abs/1504.08363","url":"https://dblp.org/rec/journals/corr/DaskalakisKT15"}, "url":"URL#3674710" }, { "@score":"1", "@id":"3674732", "info":{"authors":{"author":[{"@pid":"30/5607","text":"Son Hoang Dau"},{"@pid":"55/8211","text":"Han Mao Kiah"},{"@pid":"07/8318","text":"Wentu Song"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"Locally Encodable and Decodable Codes for Distributed Storage Systems.","venue":"CoRR","volume":"abs/1504.04926","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DauKSY15","ee":"http://arxiv.org/abs/1504.04926","url":"https://dblp.org/rec/journals/corr/DauKSY15"}, "url":"URL#3674732" }, { "@score":"1", "@id":"3674733", "info":{"authors":{"author":[{"@pid":"30/5607","text":"Son Hoang Dau"},{"@pid":"07/8318","text":"Wentu Song"},{"@pid":"01/753","text":"Chau Yuen"}]},"title":"Weakly Secure MDS Codes for Simple Multiple Access Networks.","venue":"CoRR","volume":"abs/1504.05662","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DauSY15","ee":"http://arxiv.org/abs/1504.05662","url":"https://dblp.org/rec/journals/corr/DauSY15"}, "url":"URL#3674733" }, { "@score":"1", "@id":"3674744", "info":{"authors":{"author":[{"@pid":"28/1296","text":"James H. Davenport"},{"@pid":"123/4583","text":"Matthew England 0001"}]},"title":"Recent Advances in Real Geometric Reasoning.","venue":"CoRR","volume":"abs/1504.06484","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DavenportE15","ee":"http://arxiv.org/abs/1504.06484","url":"https://dblp.org/rec/journals/corr/DavenportE15"}, "url":"URL#3674744" }, { "@score":"1", "@id":"3674752", "info":{"authors":{"author":[{"@pid":"48/2828","text":"Philip M. Davis"},{"@pid":"162/0113","text":"Angela Cochran"}]},"title":"Cited Half-Life of the Journal Literature.","venue":"CoRR","volume":"abs/1504.07479","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DavisC15","ee":"http://arxiv.org/abs/1504.07479","url":"https://dblp.org/rec/journals/corr/DavisC15"}, "url":"URL#3674752" }, { "@score":"1", "@id":"3674759", "info":{"authors":{"author":[{"@pid":"d/AnujDawar","text":"Anuj Dawar"},{"@pid":"125/2074-1","text":"Pengming Wang 0001"}]},"title":"A Definability Dichotomy for Finite Valued CSPs.","venue":"CoRR","volume":"abs/1504.03543","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DawarW15","ee":"http://arxiv.org/abs/1504.03543","url":"https://dblp.org/rec/journals/corr/DawarW15"}, "url":"URL#3674759" }, { "@score":"1", "@id":"3674761", "info":{"authors":{"author":[{"@pid":"129/6927","text":"Niv Dayan"},{"@pid":"b/PBonnet","text":"Philippe Bonnet"}]},"title":"Garbage Collection Techniques for Flash-Resident Page-Mapping FTLs.","venue":"CoRR","volume":"abs/1504.01666","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DayanB15","ee":"http://arxiv.org/abs/1504.01666","url":"https://dblp.org/rec/journals/corr/DayanB15"}, "url":"URL#3674761" }, { "@score":"1", "@id":"3674762", "info":{"authors":{"author":[{"@pid":"129/6927","text":"Niv Dayan"},{"@pid":"b/LucBouganim","text":"Luc Bouganim"},{"@pid":"b/PBonnet","text":"Philippe Bonnet"}]},"title":"Modelling and Managing SSD Write-amplification.","venue":"CoRR","volume":"abs/1504.00229","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DayanBB15","ee":"http://arxiv.org/abs/1504.00229","url":"https://dblp.org/rec/journals/corr/DayanBB15"}, "url":"URL#3674762" }, { "@score":"1", "@id":"3674779", "info":{"authors":{"author":[{"@pid":"120/6701","text":"Jeremy Debattista"},{"@pid":"l/ChristophLange2","text":"Christoph Lange 0002"},{"@pid":"05/6406","text":"Sören Auer"}]},"title":"Luzzu Quality Metric Language - A DSL for Linked Data Quality Assessment.","venue":"CoRR","volume":"abs/1504.07758","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Debattista0A15","ee":"http://arxiv.org/abs/1504.07758","url":"https://dblp.org/rec/journals/corr/Debattista0A15"}, "url":"URL#3674779" }, { "@score":"1", "@id":"3674782", "info":{"authors":{"author":[{"@pid":"117/5448","text":"Normann Decker"},{"@pid":"08/7448","text":"Daniel Thoma"}]},"title":"On Freeze LTL with Ordered Attributes.","venue":"CoRR","volume":"abs/1504.06355","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeckerT15","ee":"http://arxiv.org/abs/1504.06355","url":"https://dblp.org/rec/journals/corr/DeckerT15"}, "url":"URL#3674782" }, { "@score":"1", "@id":"3674792", "info":{"authors":{"author":{"@pid":"133/5963","text":"Azad Dehghan"}},"title":"Temporal ordering of clinical events.","venue":"CoRR","volume":"abs/1504.03659","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dehghan15","ee":"http://arxiv.org/abs/1504.03659","url":"https://dblp.org/rec/journals/corr/Dehghan15"}, "url":"URL#3674792" }, { "@score":"1", "@id":"3674810", "info":{"authors":{"author":{"@pid":"37/3560","text":"André van Delft"}},"title":"Some New Directions for ACP Research.","venue":"CoRR","volume":"abs/1504.03719","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Delft15","ee":"http://arxiv.org/abs/1504.03719","url":"https://dblp.org/rec/journals/corr/Delft15"}, "url":"URL#3674810" }, { "@score":"1", "@id":"3674829", "info":{"authors":{"author":[{"@pid":"156/7188","text":"Anastasiya V. Demidova"},{"@pid":"16/9952","text":"Anna V. Korolkova"},{"@pid":"156/6890","text":"Dmitry S. Kulyabov"},{"@pid":"19/10948","text":"Leonid A. Sevastyanov"}]},"title":"The Method of Constructing Models of Peer to Peer Protocols.","venue":"CoRR","volume":"abs/1504.00576","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DemidovaKKS15","ee":"http://arxiv.org/abs/1504.00576","url":"https://dblp.org/rec/journals/corr/DemidovaKKS15"}, "url":"URL#3674829" }, { "@score":"1", "@id":"3674833", "info":{"authors":{"author":[{"@pid":"30/5976","text":"Vasil S. Denchev"},{"@pid":"68/3975-2","text":"Nan Ding 0002"},{"@pid":"28/8127","text":"Shin Matsushima"},{"@pid":"v/SVNVishwanathan","text":"S. V. N. Vishwanathan"},{"@pid":"60/7025","text":"Hartmut Neven"}]},"title":"Totally Corrective Boosting with Cardinality Penalization.","venue":"CoRR","volume":"abs/1504.01446","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DenchevDMVN15","ee":"http://arxiv.org/abs/1504.01446","url":"https://dblp.org/rec/journals/corr/DenchevDMVN15"}, "url":"URL#3674833" }, { "@score":"1", "@id":"3674857", "info":{"authors":{"author":[{"@pid":"05/8863","text":"Daniel Denkovski"},{"@pid":"66/9953","text":"Valentin Rakovic"},{"@pid":"56/3031","text":"Vladimir Atanasovski"},{"@pid":"28/5282","text":"Liljana Gavrilovska"},{"@pid":"m/PetriMahonen","text":"Petri Mähönen"}]},"title":"Generic Multiuser Coordinated Beamforming for Underlay Spectrum Sharing.","venue":"CoRR","volume":"abs/1504.06431","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DenkovskiRAGM15","ee":"http://arxiv.org/abs/1504.06431","url":"https://dblp.org/rec/journals/corr/DenkovskiRAGM15"}, "url":"URL#3674857" }, { "@score":"1", "@id":"3674858", "info":{"authors":{"author":[{"@pid":"58/1750","text":"Louise A. Dennis"},{"@pid":"f/MichaelFisher","text":"Michael Fisher 0001"},{"@pid":"w/AlanFTWinfield","text":"Alan F. T. Winfield"}]},"title":"Towards Verifiably Ethical Robot Behaviour.","venue":"CoRR","volume":"abs/1504.03592","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DennisFW15","ee":"http://arxiv.org/abs/1504.03592","url":"https://dblp.org/rec/journals/corr/DennisFW15"}, "url":"URL#3674858" }, { "@score":"1", "@id":"3674863", "info":{"authors":{"author":[{"@pid":"85/7468","text":"Zahra Derakhshandeh"},{"@pid":"132/8945","text":"Robert Gmyr"},{"@pid":"r/AndreaWRicha","text":"Andréa W. Richa"},{"@pid":"s/ChristianScheideler","text":"Christian Scheideler"},{"@pid":"147/3358","text":"Thim Strothmann"}]},"title":"An Algorithmic Framework for Shape Formation Problems in Self-Organizing Particle Systems.","venue":"CoRR","volume":"abs/1504.00744","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DerakhshandehGR15","ee":"http://arxiv.org/abs/1504.00744","url":"https://dblp.org/rec/journals/corr/DerakhshandehGR15"}, "url":"URL#3674863" }, { "@score":"1", "@id":"3674914", "info":{"authors":{"author":[{"@pid":"40/7987","text":"Palash Dey"},{"@pid":"85/6789","text":"Neeldhara Misra"},{"@pid":"n/YNarahari","text":"Y. Narahari"}]},"title":"Frugal Bribery in Voting.","venue":"CoRR","volume":"abs/1504.08248","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeyMN15","ee":"http://arxiv.org/abs/1504.08248","url":"https://dblp.org/rec/journals/corr/DeyMN15"}, "url":"URL#3674914" }, { "@score":"1", "@id":"3674915", "info":{"authors":{"author":[{"@pid":"40/7987","text":"Palash Dey"},{"@pid":"85/6789","text":"Neeldhara Misra"},{"@pid":"n/YNarahari","text":"Y. Narahari"}]},"title":"Manipulation is Harder with Incomplete Votes.","venue":"CoRR","volume":"abs/1504.08256","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeyMN15a","ee":"http://arxiv.org/abs/1504.08256","url":"https://dblp.org/rec/journals/corr/DeyMN15a"}, "url":"URL#3674915" }, { "@score":"1", "@id":"3674917", "info":{"authors":{"author":[{"@pid":"d/TamalKDey","text":"Tamal K. Dey"},{"@pid":"60/3574","text":"Facundo Mémoli"},{"@pid":"28/5745-1","text":"Yusu Wang 0001"}]},"title":"Mutiscale Mapper: A Framework for Topological Summarization of Data and Maps.","venue":"CoRR","volume":"abs/1504.03763","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DeyMW15","ee":"http://arxiv.org/abs/1504.03763","url":"https://dblp.org/rec/journals/corr/DeyMW15"}, "url":"URL#3674917" }, { "@score":"1", "@id":"3674928", "info":{"authors":{"author":[{"@pid":"80/7909","text":"Harpreet S. Dhillon"},{"@pid":"52/496","text":"Howard C. Huang"},{"@pid":"98/67","text":"Harish Viswanathan"}]},"title":"Wide-area Wireless Communication Challenges for the Internet of Things.","venue":"CoRR","volume":"abs/1504.03242","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DhillonHV15","ee":"http://arxiv.org/abs/1504.03242","url":"https://dblp.org/rec/journals/corr/DhillonHV15"}, "url":"URL#3674928" }, { "@score":"1", "@id":"3674944", "info":{"authors":{"author":[{"@pid":"137/8215","text":"Panagiotis D. Diamantoulakis"},{"@pid":"42/1218","text":"Vasilios M. Kapinas"},{"@pid":"13/5195","text":"George K. Karagiannidis"}]},"title":"Big Data Analytics for Dynamic Energy Management in Smart Grids.","venue":"CoRR","volume":"abs/1504.02424","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DiamantoulakisK15","ee":"http://arxiv.org/abs/1504.02424","url":"https://dblp.org/rec/journals/corr/DiamantoulakisK15"}, "url":"URL#3674944" }, { "@score":"1", "@id":"3674963", "info":{"authors":{"author":[{"@pid":"63/7974","text":"Rafael Diaz"},{"@pid":"161/9835","text":"Angelica Vargas"}]},"title":"On the stability of the PWP method.","venue":"CoRR","volume":"abs/1504.03033","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DiazV15","ee":"http://arxiv.org/abs/1504.03033","url":"https://dblp.org/rec/journals/corr/DiazV15"}, "url":"URL#3674963" }, { "@score":"1", "@id":"3674966", "info":{"authors":{"author":[{"@pid":"73/3023","text":"Dave Dice"},{"@pid":"61/3834","text":"Tim Harris 0001"},{"@pid":"10/6980","text":"Alex Kogan"},{"@pid":"27/5398","text":"Yossi Lev"}]},"title":"The Influence of Malloc Placement on TSX Hardware Transactional Memory.","venue":"CoRR","volume":"abs/1504.04640","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dice0KL15","ee":"http://arxiv.org/abs/1504.04640","url":"https://dblp.org/rec/journals/corr/Dice0KL15"}, "url":"URL#3674966" }, { "@score":"1", "@id":"3674975", "info":{"authors":{"author":{"@pid":"60/5260","text":"Bob Diertens"}},"title":"Composition in the Function-Behaviour-Structure Framework.","venue":"CoRR","volume":"abs/1504.00542","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Diertens15","ee":"http://arxiv.org/abs/1504.00542","url":"https://dblp.org/rec/journals/corr/Diertens15"}, "url":"URL#3674975" }, { "@score":"1", "@id":"3675003", "info":{"authors":{"author":[{"@pid":"127/6567","text":"Weicong Ding"},{"@pid":"61/5637","text":"Prakash Ishwar"},{"@pid":"67/4721","text":"Venkatesh Saligrama"}]},"title":"Learning Mixed Membership Mallows Models from Pairwise Comparisons.","venue":"CoRR","volume":"abs/1504.00757","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DingIS15","ee":"http://arxiv.org/abs/1504.00757","url":"https://dblp.org/rec/journals/corr/DingIS15"}, "url":"URL#3675003" }, { "@score":"1", "@id":"3675039", "info":{"authors":{"author":[{"@pid":"135/6260","text":"Sjoerd Dirksen"},{"@pid":"99/500","text":"Guillaume Lecué"},{"@pid":"52/5600","text":"Holger Rauhut"}]},"title":"On the gap between RIP-properties and sparse recovery conditions.","venue":"CoRR","volume":"abs/1504.05073","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DirksenLR15","ee":"http://arxiv.org/abs/1504.05073","url":"https://dblp.org/rec/journals/corr/DirksenLR15"}, "url":"URL#3675039" }, { "@score":"1", "@id":"3675041", "info":{"authors":{"author":[{"@pid":"142/1017","text":"Vahid Rasouli Disfani"},{"@pid":"123/6622","text":"Mohammad Chehreghani Bozchalui"},{"@pid":"63/5466","text":"Ratnesh K. Sharma"}]},"title":"SDP-based State Estimation of Multi-phase Active Distribution Networks using micro-PMUs.","venue":"CoRR","volume":"abs/1504.03547","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DisfaniBS15","ee":"http://arxiv.org/abs/1504.03547","url":"https://dblp.org/rec/journals/corr/DisfaniBS15"}, "url":"URL#3675041" }, { "@score":"1", "@id":"3675044", "info":{"authors":{"author":[{"@pid":"22/687","text":"Yann Disser"},{"@pid":"56/7413","text":"Max Klimm"},{"@pid":"162/0180","text":"Elisabeth Lübbecke"}]},"title":"Scheduling Bidirectional Traffic on a Path.","venue":"CoRR","volume":"abs/1504.07129","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DisserKL15","ee":"http://arxiv.org/abs/1504.07129","url":"https://dblp.org/rec/journals/corr/DisserKL15"}, "url":"URL#3675044" }, { "@score":"1", "@id":"3675065", "info":{"authors":{"author":[{"@pid":"d/BenjaminDoerr","text":"Benjamin Doerr"},{"@pid":"62/8086","text":"Carola Doerr"}]},"title":"Optimal Parameter Choices Through Self-Adjustment: Applying the 1/5-th Rule in Discrete Settings.","venue":"CoRR","volume":"abs/1504.03212","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DoerrD15","ee":"http://arxiv.org/abs/1504.03212","url":"https://dblp.org/rec/journals/corr/DoerrD15"}, "url":"URL#3675065" }, { "@score":"1", "@id":"3675068", "info":{"authors":{"author":[{"@pid":"62/8086","text":"Carola Doerr"},{"@pid":"42/4603","text":"Johannes Lengler"}]},"title":"OneMax in Black-Box Models with Several Restrictions.","venue":"CoRR","volume":"abs/1504.02644","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DoerrL15","ee":"http://arxiv.org/abs/1504.02644","url":"https://dblp.org/rec/journals/corr/DoerrL15"}, "url":"URL#3675068" }, { "@score":"1", "@id":"3675077", "info":{"authors":{"author":{"@pid":"59/2207","text":"Nikolai Dokuchaev 0001"}},"title":"A closed equation in time domain for band-limited extensions of one-sided sequences.","venue":"CoRR","volume":"abs/1504.02298","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dokuchaev15","ee":"http://arxiv.org/abs/1504.02298","url":"https://dblp.org/rec/journals/corr/Dokuchaev15"}, "url":"URL#3675077" }, { "@score":"1", "@id":"3675100", "info":{"authors":{"author":[{"@pid":"16/1278","text":"Chao Dong"},{"@pid":"153/2574","text":"Yubin Deng"},{"@pid":"01/5855","text":"Chen Change Loy"},{"@pid":"04/5226","text":"Xiaoou Tang"}]},"title":"Compression Artifacts Reduction by a Deep Convolutional Network.","venue":"CoRR","volume":"abs/1504.06993","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongDLT15","ee":"http://arxiv.org/abs/1504.06993","url":"https://dblp.org/rec/journals/corr/DongDLT15"}, "url":"URL#3675100" }, { "@score":"1", "@id":"3675105", "info":{"authors":{"author":[{"@pid":"17/9267","text":"Yuxiao Dong"},{"@pid":"87/1696","text":"Fabio Pinelli"},{"@pid":"46/10071","text":"Yiannis Gkoufas"},{"@pid":"78/8781","text":"Zubair Nabi"},{"@pid":"38/118","text":"Francesco Calabrese"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Inferring Unusual Crowd Events From Mobile Phone Call Detail Records.","venue":"CoRR","volume":"abs/1504.03643","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongPGNCC15","ee":"http://arxiv.org/abs/1504.03643","url":"https://dblp.org/rec/journals/corr/DongPGNCC15"}, "url":"URL#3675105" }, { "@score":"1", "@id":"3675106", "info":{"authors":{"author":[{"@pid":"73/3764-2","text":"Jie Dong 0002"},{"@pid":"47/3219","text":"David B. Smith 0001"},{"@pid":"23/404","text":"Leif Hanlen"}]},"title":"Socially Optimal Coexistence of Wireless Body Area Networks Enabled by a Non-Cooperative Game.","venue":"CoRR","volume":"abs/1504.07728","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DongSH15","ee":"http://arxiv.org/abs/1504.07728","url":"https://dblp.org/rec/journals/corr/DongSH15"}, "url":"URL#3675106" }, { "@score":"1", "@id":"3675142", "info":{"authors":{"author":[{"@pid":"132/9204","text":"Ahmed Douik"},{"@pid":"19/4604","text":"Hayssam Dahrouj"},{"@pid":"00/384","text":"Tareq Y. Al-Naffouri"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks.","venue":"CoRR","volume":"abs/1504.01552","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DouikDAA15a","ee":"http://arxiv.org/abs/1504.01552","url":"https://dblp.org/rec/journals/corr/DouikDAA15a"}, "url":"URL#3675142" }, { "@score":"1", "@id":"3675144", "info":{"authors":{"author":[{"@pid":"132/9204","text":"Ahmed Douik"},{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"00/384","text":"Tareq Y. Al-Naffouri"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Rate Aware Instantly Decodable Network Codes.","venue":"CoRR","volume":"abs/1504.03985","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DouikSAA15","ee":"http://arxiv.org/abs/1504.03985","url":"https://dblp.org/rec/journals/corr/DouikSAA15"}, "url":"URL#3675144" }, { "@score":"1", "@id":"3675186", "info":{"authors":{"author":[{"@pid":"151/6400","text":"François Dross"},{"@pid":"80/4712","text":"Mickaël Montassier"},{"@pid":"87/2186","text":"Alexandre Pinlou"}]},"title":"A lower bound on the order of the largest induced forest in planar graphs with high girth.","venue":"CoRR","volume":"abs/1504.01949","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DrossMP15","ee":"http://arxiv.org/abs/1504.01949","url":"https://dblp.org/rec/journals/corr/DrossMP15"}, "url":"URL#3675186" }, { "@score":"1", "@id":"3675193", "info":{"authors":{"author":{"@pid":"51/5346","text":"Evan M. Drumwright"}},"title":"Rapidly computable viscous friction and no-slip rigid contact models.","venue":"CoRR","volume":"abs/1504.00719","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Drumwright15","ee":"http://arxiv.org/abs/1504.00719","url":"https://dblp.org/rec/journals/corr/Drumwright15"}, "url":"URL#3675193" }, { "@score":"1", "@id":"3675198", "info":{"authors":{"author":[{"@pid":"73/2914","text":"Liping Du"},{"@pid":"145/3410","text":"Mihir Laghate"},{"@pid":"59/11052","text":"Chun-Hao Liu"},{"@pid":"22/3082","text":"Danijela Cabric"}]},"title":"Improved Eigenvalue-based Spectrum Sensing via Sensor Signal Overlapping.","venue":"CoRR","volume":"abs/1504.07738","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuLLC15","ee":"http://arxiv.org/abs/1504.07738","url":"https://dblp.org/rec/journals/corr/DuLLC15"}, "url":"URL#3675198" }, { "@score":"1", "@id":"3675200", "info":{"authors":{"author":[{"@pid":"40/5548-3","text":"Liang Du 0003"},{"@pid":"12/4493","text":"Yi-Dong Shen"}]},"title":"Unsupervised Feature Selection with Adaptive Structure Learning.","venue":"CoRR","volume":"abs/1504.00736","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuS15","ee":"http://arxiv.org/abs/1504.00736","url":"https://dblp.org/rec/journals/corr/DuS15"}, "url":"URL#3675200" }, { "@score":"1", "@id":"3675241", "info":{"authors":{"author":[{"@pid":"161/9881","text":"Igor Pontes Duff"},{"@pid":"57/7141","text":"Charles Poussot-Vassal"},{"@pid":"57/10085","text":"Cédric Seren"}]},"title":"Realization independent single time-delay dynamical model interpolation and H2-optimal approximation.","venue":"CoRR","volume":"abs/1504.06457","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DuffPS15","ee":"http://arxiv.org/abs/1504.06457","url":"https://dblp.org/rec/journals/corr/DuffPS15"}, "url":"URL#3675241" }, { "@score":"1", "@id":"3675244", "info":{"authors":{"author":{"@pid":"126/3014","text":"Muharrem Dügenci"}},"title":"Honeybees-inspired heuristic algorithms for numerical optimisation.","venue":"CoRR","volume":"abs/1504.05766","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dugenci15","ee":"http://arxiv.org/abs/1504.05766","url":"https://dblp.org/rec/journals/corr/Dugenci15"}, "url":"URL#3675244" }, { "@score":"1", "@id":"3675265", "info":{"authors":{"author":{"@pid":"38/6042","text":"Jana Dunfield"}},"title":"Elaborating Evaluation-Order Polymorphism.","venue":"CoRR","volume":"abs/1504.07680","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dunfield15","ee":"http://arxiv.org/abs/1504.07680","url":"https://dblp.org/rec/journals/corr/Dunfield15"}, "url":"URL#3675265" }, { "@score":"1", "@id":"3675279", "info":{"authors":{"author":[{"@pid":"81/1445-1","text":"Bruno Durand 0001"},{"@pid":"94/1632","text":"Andrei E. Romashchenko"}]},"title":"Quasiperiodicity and non-computability in tilings.","venue":"CoRR","volume":"abs/1504.06130","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DurandR15","ee":"http://arxiv.org/abs/1504.06130","url":"https://dblp.org/rec/journals/corr/DurandR15"}, "url":"URL#3675279" }, { "@score":"1", "@id":"3675283", "info":{"authors":{"author":[{"@pid":"12/3405","text":"Giuseppe Durisi"},{"@pid":"92/3127-1","text":"Tobias Koch 0001"},{"@pid":"50/3930","text":"Petar Popovski"}]},"title":"Towards Massive, Ultra-Reliable, and Low-Latency Wireless: The Art of Sending Short Packets.","venue":"CoRR","volume":"abs/1504.06526","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DurisiKP15","ee":"http://arxiv.org/abs/1504.06526","url":"https://dblp.org/rec/journals/corr/DurisiKP15"}, "url":"URL#3675283" }, { "@score":"1", "@id":"3675284", "info":{"authors":{"author":[{"@pid":"d/ChristophDurr","text":"Christoph Dürr"},{"@pid":"09/813","text":"Lukasz Jez"},{"@pid":"123/4762","text":"Óscar C. Vásquez"}]},"title":"Mechanism design for aggregating energy consumption and quality of service in speed scaling scheduling.","venue":"CoRR","volume":"abs/1504.03586","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DurrJV15","ee":"http://arxiv.org/abs/1504.03586","url":"https://dblp.org/rec/journals/corr/DurrJV15"}, "url":"URL#3675284" }, { "@score":"1", "@id":"3675311", "info":{"authors":{"author":[{"@pid":"155/9748","text":"Sergii Dymchenko"},{"@pid":"155/9912","text":"Mariia Mykhailova"}]},"title":"Declaratively solving Google Code Jam problems with Picat.","venue":"CoRR","volume":"abs/1504.00977","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/DymchenkoM15","ee":"http://arxiv.org/abs/1504.00977","url":"https://dblp.org/rec/journals/corr/DymchenkoM15"}, "url":"URL#3675311" }, { "@score":"1", "@id":"3675312", "info":{"authors":{"author":{"@pid":"161/9968","text":"Serhii Dyshko"}},"title":"MacWilliams Extension Theorem for MDS additive codes.","venue":"CoRR","volume":"abs/1504.01355","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Dyshko15","ee":"http://arxiv.org/abs/1504.01355","url":"https://dblp.org/rec/journals/corr/Dyshko15"}, "url":"URL#3675312" }, { "@score":"1", "@id":"3675320", "info":{"authors":{"author":[{"@pid":"e/PeterEades","text":"Peter Eades"},{"@pid":"h/SeokHeeHong","text":"Seok-Hee Hong 0001"},{"@pid":"30/3372","text":"Giuseppe Liotta"},{"@pid":"55/4413","text":"Naoki Katoh"},{"@pid":"91/6695","text":"Sheung-Hung Poon"}]},"title":"Straight-line Drawability of a Planar Graph Plus an Edge.","venue":"CoRR","volume":"abs/1504.06540","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EadesHLKP15","ee":"http://arxiv.org/abs/1504.06540","url":"https://dblp.org/rec/journals/corr/EadesHLKP15"}, "url":"URL#3675320" }, { "@score":"1", "@id":"3675332", "info":{"authors":{"author":[{"@pid":"161/9808","text":"Hamza Ed-Douibi"},{"@pid":"60/7083","text":"Javier Luis Cánovas Izquierdo"},{"@pid":"55/1490","text":"Abel Gómez 0001"},{"@pid":"16/5025","text":"Massimo Tisi"},{"@pid":"18/948","text":"Jordi Cabot"}]},"title":"EMF-REST: Generation of RESTful APIs from Models.","venue":"CoRR","volume":"abs/1504.03498","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ed-DouibiIGTC15","ee":"http://arxiv.org/abs/1504.03498","url":"https://dblp.org/rec/journals/corr/Ed-DouibiIGTC15"}, "url":"URL#3675332" }, { "@score":"1", "@id":"3675335", "info":{"authors":{"author":[{"@pid":"157/6064","text":"Alon Eden"},{"@pid":"43/1464","text":"Michal Feldman"},{"@pid":"135/6169","text":"Adi Vardi"}]},"title":"Truthful Secretaries with Budgets.","venue":"CoRR","volume":"abs/1504.03625","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EdenFV15","ee":"http://arxiv.org/abs/1504.03625","url":"https://dblp.org/rec/journals/corr/EdenFV15"}, "url":"URL#3675335" }, { "@score":"1", "@id":"3675336", "info":{"authors":{"author":[{"@pid":"161/3999","text":"Talya Eden"},{"@pid":"161/4014","text":"Amit Levi"},{"@pid":"85/4800","text":"Dana Ron"}]},"title":"Approximately Counting Triangles in Sublinear Time.","venue":"CoRR","volume":"abs/1504.00954","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EdenLR15","ee":"http://arxiv.org/abs/1504.00954","url":"https://dblp.org/rec/journals/corr/EdenLR15"}, "url":"URL#3675336" }, { "@score":"1", "@id":"3675337", "info":{"authors":{"author":[{"@pid":"117/6266","text":"Essex Edwards"},{"@pid":"86/1877","text":"Robert Bridson"}]},"title":"The Discretely-Discontinuous Galerkin Coarse Grid for Domain Decomposition.","venue":"CoRR","volume":"abs/1504.00907","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EdwardsB15","ee":"http://arxiv.org/abs/1504.00907","url":"https://dblp.org/rec/journals/corr/EdwardsB15"}, "url":"URL#3675337" }, { "@score":"1", "@id":"3675340", "info":{"authors":{"author":[{"@pid":"40/3786","text":"Alexandros Efentakis"},{"@pid":"p/DieterPfoser","text":"Dieter Pfoser"}]},"title":"ReHub. Extending Hub Labels for Reverse k-Nearest Neighbor Queries on Large-Scale networks.","venue":"CoRR","volume":"abs/1504.01497","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EfentakisP15","ee":"http://arxiv.org/abs/1504.01497","url":"https://dblp.org/rec/journals/corr/EfentakisP15"}, "url":"URL#3675340" }, { "@score":"1", "@id":"3675345", "info":{"authors":{"author":[{"@pid":"80/3623","text":"Klim Efremenko"},{"@pid":"54/2884","text":"J. M. Landsberg"},{"@pid":"67/6501","text":"Hal Schenck"},{"@pid":"44/52","text":"Jerzy Weyman"}]},"title":"On minimal free resolutions and the method of shifted partial derivatives in complexity theory.","venue":"CoRR","volume":"abs/1504.05171","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EfremenkoLSW15","ee":"http://arxiv.org/abs/1504.05171","url":"https://dblp.org/rec/journals/corr/EfremenkoLSW15"}, "url":"URL#3675345" }, { "@score":"1", "@id":"3675363", "info":{"authors":{"author":[{"@pid":"161/9809","text":"Gregor Ehrensperger"},{"@pid":"60/404","text":"Alexander Ostermann"},{"@pid":"162/0006","text":"Felix Schwitzer"}]},"title":"Fast algorithms for morphological operations using run-length encoded binary images.","venue":"CoRR","volume":"abs/1504.01052","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EhrenspergerOS15","ee":"http://arxiv.org/abs/1504.01052","url":"https://dblp.org/rec/journals/corr/EhrenspergerOS15"}, "url":"URL#3675363" }, { "@score":"1", "@id":"3675368", "info":{"authors":{"author":[{"@pid":"04/7805","text":"Shoaib Ehsan"},{"@pid":"68/1143","text":"Adrian F. Clark"},{"@pid":"78/4433","text":"Klaus D. McDonald-Maier"}]},"title":"Hardware based Scale- and Rotation-Invariant Feature Extraction: A Retrospective Analysis and Future Directions.","venue":"CoRR","volume":"abs/1504.07962","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EhsanCM15","ee":"http://arxiv.org/abs/1504.07962","url":"https://dblp.org/rec/journals/corr/EhsanCM15"}, "url":"URL#3675368" }, { "@score":"1", "@id":"3675371", "info":{"authors":{"author":[{"@pid":"04/7805","text":"Shoaib Ehsan"},{"@pid":"83/9835","text":"Nadia Kanwal"},{"@pid":"68/1143","text":"Adrian F. Clark"},{"@pid":"78/4433","text":"Klaus D. McDonald-Maier"}]},"title":"Improved repeatability measures for evaluating performance of feature detectors.","venue":"CoRR","volume":"abs/1504.07967","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EhsanKCM15","ee":"http://arxiv.org/abs/1504.07967","url":"https://dblp.org/rec/journals/corr/EhsanKCM15"}, "url":"URL#3675371" }, { "@score":"1", "@id":"3675372", "info":{"authors":{"author":[{"@pid":"04/7805","text":"Shoaib Ehsan"},{"@pid":"78/4433","text":"Klaus D. McDonald-Maier"}]},"title":"On-Board Vision Processing For Small UAVs: Time to Rethink Strategy.","venue":"CoRR","volume":"abs/1504.07021","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EhsanM15","ee":"http://arxiv.org/abs/1504.07021","url":"https://dblp.org/rec/journals/corr/EhsanM15"}, "url":"URL#3675372" }, { "@score":"1", "@id":"3675373", "info":{"authors":{"author":[{"@pid":"04/7805","text":"Shoaib Ehsan"},{"@pid":"78/4433","text":"Klaus D. McDonald-Maier"}]},"title":"Exploring Integral Image Word Length Reduction Techniques for SURF Detector.","venue":"CoRR","volume":"abs/1504.07958","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EhsanM15a","ee":"http://arxiv.org/abs/1504.07958","url":"https://dblp.org/rec/journals/corr/EhsanM15a"}, "url":"URL#3675373" }, { "@score":"1", "@id":"3675381", "info":{"authors":{"author":[{"@pid":"e/FEisenbrand","text":"Friedrich Eisenbrand"},{"@pid":"119/5111","text":"Shay Moran"},{"@pid":"36/4562","text":"Rom Pinchasi"},{"@pid":"80/2691","text":"Martin Skutella"}]},"title":"Node-balancing by edge-increments.","venue":"CoRR","volume":"abs/1504.06919","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EisenbrandMPS15","ee":"http://arxiv.org/abs/1504.06919","url":"https://dblp.org/rec/journals/corr/EisenbrandMPS15"}, "url":"URL#3675381" }, { "@score":"1", "@id":"3675389", "info":{"authors":{"author":[{"@pid":"05/5140","text":"Sami El-Ferik"},{"@pid":"158/6459","text":"Bilal A. Siddiqui"},{"@pid":"82/4281","text":"Frank L. Lewis"}]},"title":"Distributed Nonlinear MPC of Multi-Agent Systems with Data Compression and Random Delays - Extended Version.","venue":"CoRR","volume":"abs/1504.03494","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/El-FerikSL15","ee":"http://arxiv.org/abs/1504.03494","url":"https://dblp.org/rec/journals/corr/El-FerikSL15"}, "url":"URL#3675389" }, { "@score":"1", "@id":"3675455", "info":{"authors":{"author":{"@pid":"161/9792","text":"Pisutpong Endoo"}},"title":"Fackbook Implementation in Developing English Writing for Thai Students.","venue":"CoRR","volume":"abs/1504.02202","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Endoo15","ee":"http://arxiv.org/abs/1504.02202","url":"https://dblp.org/rec/journals/corr/Endoo15"}, "url":"URL#3675455" }, { "@score":"1", "@id":"3675480", "info":{"authors":{"author":[{"@pid":"35/3842","text":"Jessica A. Enright"},{"@pid":"25/9061","text":"Kitty Meeks"}]},"title":"Deleting edges to restrict the size of an epidemic.","venue":"CoRR","volume":"abs/1504.05773","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EnrightM15","ee":"http://arxiv.org/abs/1504.05773","url":"https://dblp.org/rec/journals/corr/EnrightM15"}, "url":"URL#3675480" }, { "@score":"1", "@id":"3675483", "info":{"authors":{"author":[{"@pid":"22/3233","text":"Young-Ho Eom"},{"@pid":"119/4827","text":"Michelangelo Puliga"},{"@pid":"131/6999","text":"Jasmina Smailovic"},{"@pid":"55/2842","text":"Igor Mozetic"},{"@pid":"50/6478","text":"Guido Caldarelli"}]},"title":"Twitter-based analysis of the dynamics of collective attention to political parties.","venue":"CoRR","volume":"abs/1504.06861","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EomPSMC15","ee":"http://arxiv.org/abs/1504.06861","url":"https://dblp.org/rec/journals/corr/EomPSMC15"}, "url":"URL#3675483" }, { "@score":"1", "@id":"3675488", "info":{"authors":{"author":{"@pid":"e/DEppstein","text":"David Eppstein"}},"title":"The Parametric Closure Problem.","venue":"CoRR","volume":"abs/1504.04073","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Eppstein15a","ee":"http://arxiv.org/abs/1504.04073","url":"https://dblp.org/rec/journals/corr/Eppstein15a"}, "url":"URL#3675488" }, { "@score":"1", "@id":"3675493", "info":{"authors":{"author":[{"@pid":"e/DEppstein","text":"David Eppstein"},{"@pid":"58/1593","text":"J. Michael McCarthy"},{"@pid":"161/9851","text":"Brian E. Parrish"}]},"title":"Rooted Cycle Bases.","venue":"CoRR","volume":"abs/1504.04931","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/EppsteinMP15","ee":"http://arxiv.org/abs/1504.04931","url":"https://dblp.org/rec/journals/corr/EppsteinMP15"}, "url":"URL#3675493" }, { "@score":"1", "@id":"3675495", "info":{"authors":{"author":[{"@pid":"162/0042","text":"Ignacio de Erausquin"},{"@pid":"42/6079","text":"Humberto González"}]},"title":"Simultaneous Receding Horizon Estimation and Control of a Fencing Robot using a Single Camera.","venue":"CoRR","volume":"abs/1504.03581","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErausquinG15","ee":"http://arxiv.org/abs/1504.03581","url":"https://dblp.org/rec/journals/corr/ErausquinG15"}, "url":"URL#3675495" }, { "@score":"1", "@id":"3675507", "info":{"authors":{"author":[{"@pid":"e/ThomasErlebach","text":"Thomas Erlebach"},{"@pid":"h/MichaelHoffmann2","text":"Michael Hoffmann 0002"},{"@pid":"29/6224","text":"Frank Kammer"}]},"title":"On Temporal Graph Exploration.","venue":"CoRR","volume":"abs/1504.07976","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Erlebach0K15","ee":"http://arxiv.org/abs/1504.07976","url":"https://dblp.org/rec/journals/corr/Erlebach0K15"}, "url":"URL#3675507" }, { "@score":"1", "@id":"3675512", "info":{"authors":{"author":{"@pid":"162/0213","text":"Emre Erturk"}},"title":"Two Trends in Mobile Security: Financial Motives and Transitioning from Static to Dynamic Analysis.","venue":"CoRR","volume":"abs/1504.06893","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Erturk15","ee":"http://arxiv.org/abs/1504.06893","url":"https://dblp.org/rec/journals/corr/Erturk15"}, "url":"URL#3675512" }, { "@score":"1", "@id":"3675513", "info":{"authors":{"author":[{"@pid":"162/0213","text":"Emre Erturk"},{"@pid":"161/9843","text":"Derwyn Fail"}]},"title":"Information Technology in New Zealand: Review of Emerging Social Trends, Current Issues, and Policies.","venue":"CoRR","volume":"abs/1504.07012","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ErturkF15","ee":"http://arxiv.org/abs/1504.07012","url":"https://dblp.org/rec/journals/corr/ErturkF15"}, "url":"URL#3675513" }, { "@score":"1", "@id":"3675594", "info":{"authors":{"author":[{"@pid":"138/0709","text":"Stefan Fafianie"},{"@pid":"93/5872","text":"Stefan Kratsch"}]},"title":"A shortcut to (sun)flowers: Kernels in logarithmic space or linear time.","venue":"CoRR","volume":"abs/1504.08235","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FafianieK15","ee":"http://arxiv.org/abs/1504.08235","url":"https://dblp.org/rec/journals/corr/FafianieK15"}, "url":"URL#3675594" }, { "@score":"1", "@id":"3675597", "info":{"authors":{"author":[{"@pid":"38/2122","text":"Lorenzo Fagiano"},{"@pid":"161/9804","text":"Rudolf Gati"}]},"title":"Order Reduction of the Radiative Heat Transfer Model for the Simulation of Plasma Arcs.","venue":"CoRR","volume":"abs/1504.06204","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FagianoG15","ee":"http://arxiv.org/abs/1504.06204","url":"https://dblp.org/rec/journals/corr/FagianoG15"}, "url":"URL#3675597" }, { "@score":"1", "@id":"3675601", "info":{"authors":{"author":[{"@pid":"98/11153","text":"Jihad Fahs"},{"@pid":"88/2026","text":"Ibrahim C. Abou-Faycal"}]},"title":"On the Finiteness of the Capacity of Continuous Channels.","venue":"CoRR","volume":"abs/1504.03814","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FahsA15","ee":"http://arxiv.org/abs/1504.03814","url":"https://dblp.org/rec/journals/corr/FahsA15"}, "url":"URL#3675601" }, { "@score":"1", "@id":"3675603", "info":{"authors":{"author":[{"@pid":"146/0669","text":"Geoffrey Fairchild"},{"@pid":"133/4660","text":"Lalindra De Silva"},{"@pid":"35/2428","text":"Sara Y. Del Valle"},{"@pid":"200/7923","text":"Alberto M. Segre"}]},"title":"Eliciting Disease Data from Wikipedia Articles.","venue":"CoRR","volume":"abs/1504.00657","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FairchildSVS15","ee":"http://arxiv.org/abs/1504.00657","url":"https://dblp.org/rec/journals/corr/FairchildSVS15"}, "url":"URL#3675603" }, { "@score":"1", "@id":"3675608", "info":{"authors":{"author":[{"@pid":"162/0114","text":"Moein Falahatgar"},{"@pid":"45/10782","text":"Ashkan Jafarpour"},{"@pid":"o/AlonOrlitsky","text":"Alon Orlitsky"},{"@pid":"137/0163","text":"Venkatadheeraj Pichapathi"},{"@pid":"119/3884","text":"Ananda Theertha Suresh"}]},"title":"Faster Algorithms for Testing under Conditional Sampling.","venue":"CoRR","volume":"abs/1504.04103","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FalahatgarJOPS15","ee":"http://arxiv.org/abs/1504.04103","url":"https://dblp.org/rec/journals/corr/FalahatgarJOPS15"}, "url":"URL#3675608" }, { "@score":"1", "@id":"3675609", "info":{"authors":{"author":[{"@pid":"162/0114","text":"Moein Falahatgar"},{"@pid":"45/10782","text":"Ashkan Jafarpour"},{"@pid":"o/AlonOrlitsky","text":"Alon Orlitsky"},{"@pid":"137/0163","text":"Venkatadheeraj Pichapati"},{"@pid":"119/3884","text":"Ananda Theertha Suresh"}]},"title":"Universal Compression of Power-Law Distributions.","venue":"CoRR","volume":"abs/1504.08070","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FalahatgarJOPS15a","ee":"http://arxiv.org/abs/1504.08070","url":"https://dblp.org/rec/journals/corr/FalahatgarJOPS15a"}, "url":"URL#3675609" }, { "@score":"1", "@id":"3675619", "info":{"authors":{"author":[{"@pid":"130/8157","text":"Miao Fan"},{"@pid":"93/555-5","text":"Kai Cao 0005"},{"@pid":"70/6707","text":"Yifan He"},{"@pid":"32/3175","text":"Ralph Grishman"}]},"title":"Jointly Embedding Relations and Mentions for Knowledge Population.","venue":"CoRR","volume":"abs/1504.01683","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanCHG15","ee":"http://arxiv.org/abs/1504.01683","url":"https://dblp.org/rec/journals/corr/FanCHG15"}, "url":"URL#3675619" }, { "@score":"1", "@id":"3675620", "info":{"authors":{"author":[{"@pid":"55/10699","text":"YouZhe Fan"},{"@pid":"13/124","text":"Ji Chen"},{"@pid":"162/0217","text":"ChenYang Xia"},{"@pid":"26/1737","text":"Chi-Ying Tsui"},{"@pid":"55/1483","text":"Jie Jin"},{"@pid":"60/1307-6","text":"Hui Shen 0006"},{"@pid":"89/6764-13","text":"Bin Li 0013"}]},"title":"Low-latency List Decoding Of Polar Codes With Double Thresholding.","venue":"CoRR","volume":"abs/1504.03437","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanCXTJSL15","ee":"http://arxiv.org/abs/1504.03437","url":"https://dblp.org/rec/journals/corr/FanCXTJSL15"}, "url":"URL#3675620" }, { "@score":"1", "@id":"3675624", "info":{"authors":{"author":[{"@pid":"58/107","text":"Zhun Fan"},{"@pid":"57/1656","text":"Wenji Li"},{"@pid":"92/2985","text":"Xinye Cai"},{"@pid":"148/1070","text":"Huibiao Lin"},{"@pid":"148/0931","text":"Shuxiang Xie"},{"@pid":"56/2450","text":"Erik D. Goodman"}]},"title":"A New Repair Operator for Multi-objective Evolutionary Algorithm in Constrained Optimization Problems.","venue":"CoRR","volume":"abs/1504.00154","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanLCLXG15","ee":"http://arxiv.org/abs/1504.00154","url":"https://dblp.org/rec/journals/corr/FanLCLXG15"}, "url":"URL#3675624" }, { "@score":"1", "@id":"3675636", "info":{"authors":{"author":[{"@pid":"150/3962","text":"Xiaochuan Fan"},{"@pid":"150/4204","text":"Kang Zheng"},{"@pid":"41/1100","text":"Yuewei Lin"},{"@pid":"62/3151-2","text":"Song Wang 0002"}]},"title":"Combining Local Appearance and Holistic View: Dual-Source Deep Neural Networks for Human Pose Estimation.","venue":"CoRR","volume":"abs/1504.07159","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanZLW15","ee":"http://arxiv.org/abs/1504.07159","url":"https://dblp.org/rec/journals/corr/FanZLW15"}, "url":"URL#3675636" }, { "@score":"1", "@id":"3675639", "info":{"authors":{"author":[{"@pid":"130/8157","text":"Miao Fan"},{"@pid":"43/3182","text":"Qiang Zhou"},{"@pid":"53/2843","text":"Thomas Fang Zheng"},{"@pid":"32/3175","text":"Ralph Grishman"}]},"title":"Large Margin Nearest Neighbor Embedding for Knowledge Representation.","venue":"CoRR","volume":"abs/1504.01684","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FanZZG15","ee":"http://arxiv.org/abs/1504.01684","url":"https://dblp.org/rec/journals/corr/FanZZG15"}, "url":"URL#3675639" }, { "@score":"1", "@id":"3675657", "info":{"authors":{"author":[{"@pid":"f/MartinFarachColton","text":"Martin Farach-Colton"},{"@pid":"20/8237","text":"Meng-Tsung Tsai"}]},"title":"On the complexity of computing prime tables.","venue":"CoRR","volume":"abs/1504.05240","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Farach-ColtonT15","ee":"http://arxiv.org/abs/1504.05240","url":"https://dblp.org/rec/journals/corr/Farach-ColtonT15"}, "url":"URL#3675657" }, { "@score":"1", "@id":"3675676", "info":{"authors":{"author":{"@pid":"159/2090","text":"Gabriele Farina"}},"title":"A linear time algorithm to compute the impact of all the articulation points.","venue":"CoRR","volume":"abs/1504.00341","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Farina15","ee":"http://arxiv.org/abs/1504.00341","url":"https://dblp.org/rec/journals/corr/Farina15"}, "url":"URL#3675676" }, { "@score":"1", "@id":"3675683", "info":{"authors":{"author":[{"@pid":"132/7757","text":"Farzan Farnia"},{"@pid":"43/8577","text":"Meisam Razaviyayn"},{"@pid":"61/8774","text":"Sreeram Kannan"},{"@pid":"t/DavidNCTse","text":"David Tse"}]},"title":"Minimum HGR Correlation Principle: From Marginals to Joint Distribution.","venue":"CoRR","volume":"abs/1504.06010","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FarniaRKT15","ee":"http://arxiv.org/abs/1504.06010","url":"https://dblp.org/rec/journals/corr/FarniaRKT15"}, "url":"URL#3675683" }, { "@score":"1", "@id":"3675737", "info":{"authors":{"author":[{"@pid":"05/7445","text":"Peter Faymonville"},{"@pid":"70/5831-2","text":"Martin Zimmermann 0002"}]},"title":"Parametric Linear Dynamic Logic (full version).","venue":"CoRR","volume":"abs/1504.03880","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Faymonville015","ee":"http://arxiv.org/abs/1504.03880","url":"https://dblp.org/rec/journals/corr/Faymonville015"}, "url":"URL#3675737" }, { "@score":"1", "@id":"3675768", "info":{"authors":{"author":[{"@pid":"30/11469","text":"Ofer Feinerman"},{"@pid":"48/4888","text":"Amos Korman"}]},"title":"Clock Synchronization and Distributed Estimation in Highly Dynamic Networks: An Information Theoretic Approach.","venue":"CoRR","volume":"abs/1504.08247","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FeinermanK15","ee":"http://arxiv.org/abs/1504.08247","url":"https://dblp.org/rec/journals/corr/FeinermanK15"}, "url":"URL#3675768" }, { "@score":"1", "@id":"3675780", "info":{"authors":{"author":[{"@pid":"67/1162","text":"Vitaly Feldman"},{"@pid":"29/5942","text":"Jan Vondrák"}]},"title":"Tight Bounds on Low-degree Spectral Concentration of Submodular and XOS functions.","venue":"CoRR","volume":"abs/1504.03391","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FeldmanV15","ee":"http://arxiv.org/abs/1504.03391","url":"https://dblp.org/rec/journals/corr/FeldmanV15"}, "url":"URL#3675780" }, { "@score":"1", "@id":"3675789", "info":{"authors":{"author":[{"@pid":"161/4574","text":"Jean Louis Ebongue Kedieng Fendji"},{"@pid":"161/4569","text":"Jean Michel Nlong"}]},"title":"Rural Wireless Mesh Network: A Design Methodology.","venue":"CoRR","volume":"abs/1504.08213","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FendjiN15","ee":"http://arxiv.org/abs/1504.08213","url":"https://dblp.org/rec/journals/corr/FendjiN15"}, "url":"URL#3675789" }, { "@score":"1", "@id":"3675790", "info":{"authors":{"author":[{"@pid":"161/4574","text":"Jean Louis Ebongue Kedieng Fendji"},{"@pid":"145/8081","text":"Christopher Thron"},{"@pid":"161/4569","text":"Jean Michel Nlong"}]},"title":"A Metropolis Approach for Mesh Router Nodes placement in Rural Wireless Mesh Networks.","venue":"CoRR","volume":"abs/1504.08212","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FendjiTN15","ee":"http://arxiv.org/abs/1504.08212","url":"https://dblp.org/rec/journals/corr/FendjiTN15"}, "url":"URL#3675790" }, { "@score":"1", "@id":"3675809", "info":{"authors":{"author":[{"@pid":"87/2264","text":"Raphaël Féraud"},{"@pid":"151/6611","text":"Robin Allesiardo"},{"@pid":"17/5881","text":"Tanguy Urvoy"},{"@pid":"37/3221","text":"Fabrice Clérot"}]},"title":"Decision Tree Algorithms for the Contextual Bandit Problem.","venue":"CoRR","volume":"abs/1504.06952","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FeraudAUC15","ee":"http://arxiv.org/abs/1504.06952","url":"https://dblp.org/rec/journals/corr/FeraudAUC15"}, "url":"URL#3675809" }, { "@score":"1", "@id":"3675816", "info":{"authors":{"author":[{"@pid":"142/4138","text":"Jesus Fernandez-Bes"},{"@pid":"06/1862","text":"Jerónimo Arenas-García"},{"@pid":"21/7050","text":"Magno T. M. Silva"},{"@pid":"35/7822","text":"Luis Antonio Azpicueta-Ruiz"}]},"title":"Decoupled Adapt-then-Combine diffusion networks with adaptive combiners.","venue":"CoRR","volume":"abs/1504.01982","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fernandez-BesAS15","ee":"http://arxiv.org/abs/1504.01982","url":"https://dblp.org/rec/journals/corr/Fernandez-BesAS15"}, "url":"URL#3675816" }, { "@score":"1", "@id":"3675837", "info":{"authors":{"author":[{"@pid":"87/3758","text":"Flavio Ferrarotti"},{"@pid":"s/KlausDieterSchewe","text":"Klaus-Dieter Schewe"},{"@pid":"49/7428","text":"Loredana Tec"},{"@pid":"97/6505-2","text":"Qing Wang 0002"}]},"title":"A New Thesis concerning Synchronised Parallel Computing - Simplified Parallel ASM Thesis.","venue":"CoRR","volume":"abs/1504.06203","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FerrarottiSTW15","ee":"http://arxiv.org/abs/1504.06203","url":"https://dblp.org/rec/journals/corr/FerrarottiSTW15"}, "url":"URL#3675837" }, { "@score":"1", "@id":"3675840", "info":{"authors":{"author":[{"@pid":"39/4271","text":"Ramon Ferrer-i-Cancho"},{"@pid":"142/5112","text":"Chris Bentz"},{"@pid":"161/9869","text":"Caio Seguin"}]},"title":"Compression and the origins of Zipf's law of abbreviation.","venue":"CoRR","volume":"abs/1504.04884","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ferrer-i-Cancho15","ee":"http://arxiv.org/abs/1504.04884","url":"https://dblp.org/rec/journals/corr/Ferrer-i-Cancho15"}, "url":"URL#3675840" }, { "@score":"1", "@id":"3675870", "info":{"authors":{"author":[{"@pid":"72/1349","text":"Matthew C. Fickus"},{"@pid":"87/8147","text":"Dustin G. Mixon"}]},"title":"Tables of the existence of equiangular tight frames.","venue":"CoRR","volume":"abs/1504.00253","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FickusM15","ee":"http://arxiv.org/abs/1504.00253","url":"https://dblp.org/rec/journals/corr/FickusM15"}, "url":"URL#3675870" }, { "@score":"1", "@id":"3675877", "info":{"authors":{"author":[{"@pid":"88/5880","text":"Isabel N. Figueiredo"},{"@pid":"42/270","text":"Carlos F. Leal"},{"@pid":"03/3395-2","text":"Luís Pinto 0002"},{"@pid":"04/8401","text":"Pedro N. Figueiredo"},{"@pid":"00/6413","text":"Richard Tsai 0001"}]},"title":"An Elastic Image Registration Approach for Wireless Capsule Endoscope Localization.","venue":"CoRR","volume":"abs/1504.06206","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FigueiredoLPFT15","ee":"http://arxiv.org/abs/1504.06206","url":"https://dblp.org/rec/journals/corr/FigueiredoLPFT15"}, "url":"URL#3675877" }, { "@score":"1", "@id":"3675880", "info":{"authors":{"author":[{"@pid":"161/9967","text":"Michael Figurnov"},{"@pid":"89/3348","text":"Dmitry P. Vetrov"},{"@pid":"94/248","text":"Pushmeet Kohli"}]},"title":"PerforatedCNNs: Acceleration through Elimination of Redundant Convolutions.","venue":"CoRR","volume":"abs/1504.08362","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FigurnovVK15","ee":"http://arxiv.org/abs/1504.08362","url":"https://dblp.org/rec/journals/corr/FigurnovVK15"}, "url":"URL#3675880" }, { "@score":"1", "@id":"3675889", "info":{"authors":{"author":[{"@pid":"43/7769","text":"Hugo Serrano Barbosa Filho"},{"@pid":"14/4787","text":"Fernando Buarque de Lima Neto"},{"@pid":"06/97","text":"Alexandre G. Evsukoff"},{"@pid":"10/6227","text":"Ronaldo Menezes"}]},"title":"The Effect of Recency to Human Mobility.","venue":"CoRR","volume":"abs/1504.01442","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FilhoNEM15","ee":"http://arxiv.org/abs/1504.01442","url":"https://dblp.org/rec/journals/corr/FilhoNEM15"}, "url":"URL#3675889" }, { "@score":"1", "@id":"3675891", "info":{"authors":{"author":[{"@pid":"162/0179","text":"A. V. Filimonov"},{"@pid":"162/0121","text":"A. V. Osipov"},{"@pid":"162/0021","text":"A. B. Klimov"}]},"title":"Application of neural networks to identify trolls in social networks.","venue":"CoRR","volume":"abs/1504.07416","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FilimonovOK15","ee":"http://arxiv.org/abs/1504.07416","url":"https://dblp.org/rec/journals/corr/FilimonovOK15"}, "url":"URL#3675891" }, { "@score":"1", "@id":"3675909", "info":{"authors":{"author":[{"@pid":"12/4394","text":"Philipp Fischer"},{"@pid":"135/4956","text":"Alexey Dosovitskiy"},{"@pid":"151/9307","text":"Eddy Ilg"},{"@pid":"161/9887","text":"Philip Häusser"},{"@pid":"161/7891","text":"Caner Hazirbas"},{"@pid":"162/0182","text":"Vladimir Golkov"},{"@pid":"24/6573","text":"Patrick van der Smagt"},{"@pid":"c/DanielCremers","text":"Daniel Cremers"},{"@pid":"97/4586","text":"Thomas Brox"}]},"title":"FlowNet: Learning Optical Flow with Convolutional Networks.","venue":"CoRR","volume":"abs/1504.06852","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FischerDIHHGSCB15","ee":"http://arxiv.org/abs/1504.06852","url":"https://dblp.org/rec/journals/corr/FischerDIHHGSCB15"}, "url":"URL#3675909" }, { "@score":"1", "@id":"3675911", "info":{"authors":{"author":[{"@pid":"90/834-1","text":"Johannes Fischer 0001"},{"@pid":"95/2224","text":"Tomohiro I"},{"@pid":"129/9119","text":"Dominik Köppl"}]},"title":"Lempel Ziv Computation In Small Space (LZ-CISS).","venue":"CoRR","volume":"abs/1504.02605","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FischerIK15","ee":"http://arxiv.org/abs/1504.02605","url":"https://dblp.org/rec/journals/corr/FischerIK15"}, "url":"URL#3675911" }, { "@score":"1", "@id":"3675913", "info":{"authors":{"author":[{"@pid":"34/814","text":"Eldar Fischer"},{"@pid":"06/6269","text":"Oded Lachish"},{"@pid":"23/10305","text":"Yadu Vasudev"}]},"title":"Trading query complexity for sample-based testing and multi-testing scalability.","venue":"CoRR","volume":"abs/1504.00695","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FischerLV15","ee":"http://arxiv.org/abs/1504.00695","url":"https://dblp.org/rec/journals/corr/FischerLV15"}, "url":"URL#3675913" }, { "@score":"1", "@id":"3675915", "info":{"authors":{"author":[{"@pid":"120/7003","text":"Benjamin Fish"},{"@pid":"74/10813","text":"Rajmonda Sulo Caceres"}]},"title":"Handling oversampling in dynamic networks using link prediction.","venue":"CoRR","volume":"abs/1504.06667","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FishC15","ee":"http://arxiv.org/abs/1504.06667","url":"https://dblp.org/rec/journals/corr/FishC15"}, "url":"URL#3675915" }, { "@score":"1", "@id":"3675923", "info":{"authors":{"author":{"@pid":"50/11265","text":"Cristina Flaut"}},"title":"Some connections between binary block codes and Hilbert algebras.","venue":"CoRR","volume":"abs/1504.08128","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Flaut15","ee":"http://arxiv.org/abs/1504.08128","url":"https://dblp.org/rec/journals/corr/Flaut15"}, "url":"URL#3675923" }, { "@score":"1", "@id":"3675936", "info":{"authors":{"author":{"@pid":"45/1494","text":"Vincenzo De Florio"}},"title":"The DIR Net: A Distributed System for Detection, Isolation, and Recovery.","venue":"CoRR","volume":"abs/1504.07281","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Florio15a","ee":"http://arxiv.org/abs/1504.07281","url":"https://dblp.org/rec/journals/corr/Florio15a"}, "url":"URL#3675936" }, { "@score":"1", "@id":"3675940", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"A Survey of Linguistic Structures for Application-level Fault-Tolerance.","venue":"CoRR","volume":"abs/1504.03256","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15","ee":"http://arxiv.org/abs/1504.03256","url":"https://dblp.org/rec/journals/corr/FlorioB15"}, "url":"URL#3675940" }, { "@score":"1", "@id":"3675941", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"The Algorithm of Pipelined Gossiping.","venue":"CoRR","volume":"abs/1504.03277","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15a","ee":"http://arxiv.org/abs/1504.03277","url":"https://dblp.org/rec/journals/corr/FlorioB15a"}, "url":"URL#3675941" }, { "@score":"1", "@id":"3675942", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"Design Tool To Express Failure Detection Protocols.","venue":"CoRR","volume":"abs/1504.03449","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15b","ee":"http://arxiv.org/abs/1504.03449","url":"https://dblp.org/rec/journals/corr/FlorioB15b"}, "url":"URL#3675942" }, { "@score":"1", "@id":"3675943", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"On the Requirements of New Software Development.","venue":"CoRR","volume":"abs/1504.03715","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15c","ee":"http://arxiv.org/abs/1504.03715","url":"https://dblp.org/rec/journals/corr/FlorioB15c"}, "url":"URL#3675943" }, { "@score":"1", "@id":"3675944", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"Safety enhancement through situation-aware user interfaces.","venue":"CoRR","volume":"abs/1504.03731","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15d","ee":"http://arxiv.org/abs/1504.03731","url":"https://dblp.org/rec/journals/corr/FlorioB15d"}, "url":"URL#3675944" }, { "@score":"1", "@id":"3675945", "info":{"authors":{"author":[{"@pid":"45/1494","text":"Vincenzo De Florio"},{"@pid":"89/1506","text":"Chris Blondia"}]},"title":"A System Structure for Adaptive Mobile Applications.","venue":"CoRR","volume":"abs/1504.06353","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FlorioB15e","ee":"http://arxiv.org/abs/1504.06353","url":"https://dblp.org/rec/journals/corr/FlorioB15e"}, "url":"URL#3675945" }, { "@score":"1", "@id":"3675954", "info":{"authors":{"author":[{"@pid":"119/1646","text":"Andreas Follner"},{"@pid":"94/5744","text":"Eric Bodden"}]},"title":"ROPocop - Dynamic Mitigation of Code-Reuse Attacks.","venue":"CoRR","volume":"abs/1504.02288","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FollnerB15","ee":"http://arxiv.org/abs/1504.02288","url":"https://dblp.org/rec/journals/corr/FollnerB15"}, "url":"URL#3675954" }, { "@score":"1", "@id":"3676002", "info":{"authors":{"author":[{"@pid":"118/1463","text":"Eli Fox-Epstein"},{"@pid":"161/9976","text":"Roie Levin"},{"@pid":"162/0181","text":"David Meierfrankenfeld"}]},"title":"PTAS for MAP Assignment on Pairwise Markov Random Fields in Planar Graphs.","venue":"CoRR","volume":"abs/1504.01311","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Fox-EpsteinLM15","ee":"http://arxiv.org/abs/1504.01311","url":"https://dblp.org/rec/journals/corr/Fox-EpsteinLM15"}, "url":"URL#3676002" }, { "@score":"1", "@id":"3676003", "info":{"authors":{"author":[{"@pid":"11/8774","text":"Kyle Fox"},{"@pid":"k/PhilipNKlein","text":"Philip N. Klein"},{"@pid":"35/6579","text":"Shay Mozes"}]},"title":"A Polynomial-time Bicriteria Approximation Scheme for Planar Bisection.","venue":"CoRR","volume":"abs/1504.08008","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FoxKM15","ee":"http://arxiv.org/abs/1504.08008","url":"https://dblp.org/rec/journals/corr/FoxKM15"}, "url":"URL#3676003" }, { "@score":"1", "@id":"3676021", "info":{"authors":{"author":[{"@pid":"f/MassimoFranceschetti","text":"Massimo Franceschetti"},{"@pid":"143/6080","text":"Taehyung J. Lim"}]},"title":"Information without rolling dice.","venue":"CoRR","volume":"abs/1504.04654","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FranceschettiL15","ee":"http://arxiv.org/abs/1504.04654","url":"https://dblp.org/rec/journals/corr/FranceschettiL15"}, "url":"URL#3676021" }, { "@score":"1", "@id":"3676022", "info":{"authors":{"author":[{"@pid":"01/487","text":"Paolo Di Francesco"},{"@pid":"67/7179","text":"Francesco Malandrino"},{"@pid":"26/6237","text":"Tim K. Forde"},{"@pid":"87/1848","text":"Luiz A. DaSilva"}]},"title":"A Sharing- and Competition-Aware Framework for Cellular Network Evolution Planning.","venue":"CoRR","volume":"abs/1504.03213","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrancescoMFD15","ee":"http://arxiv.org/abs/1504.03213","url":"https://dblp.org/rec/journals/corr/FrancescoMFD15"}, "url":"URL#3676022" }, { "@score":"1", "@id":"3676034", "info":{"authors":{"author":[{"@pid":"162/0034","text":"Alvaro Frank"},{"@pid":"38/10068","text":"Diego Fabregat-Traver"},{"@pid":"b/PaoloBientinesi","text":"Paolo Bientinesi"}]},"title":"Large-scale linear regression: Development of high-performance routines.","venue":"CoRR","volume":"abs/1504.07890","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FrankFB15","ee":"http://arxiv.org/abs/1504.07890","url":"https://dblp.org/rec/journals/corr/FrankFB15"}, "url":"URL#3676034" }, { "@score":"1", "@id":"3676043", "info":{"authors":{"author":[{"@pid":"154/1353","text":"Jordan Frécon"},{"@pid":"66/8052","text":"Nelly Pustelnik"},{"@pid":"51/1327","text":"Patrice Abry"},{"@pid":"88/1335","text":"Laurent Condat"}]},"title":"On-the-fly Approximation of Multivariate Total Variation Minimization.","venue":"CoRR","volume":"abs/1504.05854","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FreconPAC15","ee":"http://arxiv.org/abs/1504.05854","url":"https://dblp.org/rec/journals/corr/FreconPAC15"}, "url":"URL#3676043" }, { "@score":"1", "@id":"3676072", "info":{"authors":{"author":[{"@pid":"21/8198","text":"Richard Fritzsche"},{"@pid":"53/5151","text":"Peter Rost"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Robust Rate Adaptation and Proportional Fair Scheduling with Imperfect CSI.","venue":"CoRR","volume":"abs/1504.03803","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FritzscheRF15","ee":"http://arxiv.org/abs/1504.03803","url":"https://dblp.org/rec/journals/corr/FritzscheRF15"}, "url":"URL#3676072" }, { "@score":"1", "@id":"3676110", "info":{"authors":{"author":[{"@pid":"67/9097","text":"Kazuo Fujikawa"},{"@pid":"60/10095","text":"Mo-Lin Ge"},{"@pid":"144/9841","text":"Yu-Long Liu"},{"@pid":"78/6217","text":"Qing Zhao"}]},"title":"Uncertainty principle, Shannon-Nyquist sampling and beyond.","venue":"CoRR","volume":"abs/1504.01467","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FujikawaGLZ15","ee":"http://arxiv.org/abs/1504.01467","url":"https://dblp.org/rec/journals/corr/FujikawaGLZ15"}, "url":"URL#3676110" }, { "@score":"1", "@id":"3676111", "info":{"authors":{"author":[{"@pid":"91/6191","text":"Satoru Fujishige"},{"@pid":"g/MichelXGoemans","text":"Michel X. Goemans"},{"@pid":"35/4992","text":"Tobias Harks"},{"@pid":"68/2328","text":"Britta Peis"},{"@pid":"48/4189","text":"Rico Zenklusen"}]},"title":"Matroids are Immune to Braess Paradox.","venue":"CoRR","volume":"abs/1504.07545","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FujishigeGHPZ15","ee":"http://arxiv.org/abs/1504.07545","url":"https://dblp.org/rec/journals/corr/FujishigeGHPZ15"}, "url":"URL#3676111" }, { "@score":"1", "@id":"3676128", "info":{"authors":{"author":{"@pid":"50/155","text":"Hanna Furmanczyk"}},"title":"Equitable total coloring of corona of cubic graphs.","venue":"CoRR","volume":"abs/1504.04869","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Furmanczyk15","ee":"http://arxiv.org/abs/1504.04869","url":"https://dblp.org/rec/journals/corr/Furmanczyk15"}, "url":"URL#3676128" }, { "@score":"1", "@id":"3676134", "info":{"authors":{"author":[{"@pid":"66/10906","text":"Riccardo Fusaroli"},{"@pid":"162/0104","text":"Johanne S. Bjørndahl"},{"@pid":"38/8797","text":"Andreas Roepstorff"},{"@pid":"152/1321","text":"Kristian Tylén"}]},"title":"A Heart for Interaction: Physiological Entrainment and Behavioral Coordination in a Collective, Creative Construction Task.","venue":"CoRR","volume":"abs/1504.05750","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/FusaroliBRT15","ee":"http://arxiv.org/abs/1504.05750","url":"https://dblp.org/rec/journals/corr/FusaroliBRT15"}, "url":"URL#3676134" }, { "@score":"1", "@id":"3676140", "info":{"authors":{"author":[{"@pid":"161/9853","text":"Deepa K. G."},{"@pid":"76/11267","text":"Sooraj K. Ambat"},{"@pid":"39/5539","text":"K. V. S. Hari"}]},"title":"Fusion of Sparse Reconstruction Algorithms for Multiple Measurement Vectors.","venue":"CoRR","volume":"abs/1504.01705","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GAH15","ee":"http://arxiv.org/abs/1504.01705","url":"https://dblp.org/rec/journals/corr/GAH15"}, "url":"URL#3676140" }, { "@score":"1", "@id":"3676145", "info":{"authors":{"author":{"@pid":"g/DovMGabbay","text":"Dov M. Gabbay"}},"title":"Theory of Semi-Instantiation in Abstract Argumentation.","venue":"CoRR","volume":"abs/1504.07020","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gabbay15","ee":"http://arxiv.org/abs/1504.07020","url":"https://dblp.org/rec/journals/corr/Gabbay15"}, "url":"URL#3676145" }, { "@score":"1", "@id":"3676165", "info":{"authors":{"author":[{"@pid":"86/7615","text":"Vijay Gadepally"},{"@pid":"162/0168","text":"Braden Hancock"},{"@pid":"162/0178","text":"Benjamin Kaiser"},{"@pid":"25/6583","text":"Jeremy Kepner"},{"@pid":"58/10271","text":"Peter Michaleas"},{"@pid":"59/6288","text":"Mayank Varia"},{"@pid":"05/4233","text":"Arkady Yerukhimovich"}]},"title":"Computing on Masked Data to improve the Security of Big Data.","venue":"CoRR","volume":"abs/1504.01287","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GadepallyHKKMVY15","ee":"http://arxiv.org/abs/1504.01287","url":"https://dblp.org/rec/journals/corr/GadepallyHKKMVY15"}, "url":"URL#3676165" }, { "@score":"1", "@id":"3676179", "info":{"authors":{"author":[{"@pid":"129/5170","text":"Tommaso Gagliardoni"},{"@pid":"27/1744","text":"Andreas Hülsing"},{"@pid":"69/6793","text":"Christian Schaffner"}]},"title":"Semantic Security and Indistinguishability in the Quantum World.","venue":"CoRR","volume":"abs/1504.05255","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GagliardoniHS15","ee":"http://arxiv.org/abs/1504.05255","url":"https://dblp.org/rec/journals/corr/GagliardoniHS15"}, "url":"URL#3676179" }, { "@score":"1", "@id":"3676192", "info":{"authors":{"author":[{"@pid":"11/11268","text":"Jakub Gajarský"},{"@pid":"53/1317","text":"Petr Hlinený"},{"@pid":"78/67","text":"Daniel Lokshtanov"},{"@pid":"61/6452","text":"Jan Obdrzálek"},{"@pid":"88/3220","text":"Sebastian Ordyniak"},{"@pid":"04/9023","text":"M. S. Ramanujan 0001"},{"@pid":"11/5491","text":"Saket Saurabh 0001"}]},"title":"FO Model Checking on Posets of Bounded Width.","venue":"CoRR","volume":"abs/1504.04115","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GajarskyHLOORS15","ee":"http://arxiv.org/abs/1504.04115","url":"https://dblp.org/rec/journals/corr/GajarskyHLOORS15"}, "url":"URL#3676192" }, { "@score":"1", "@id":"3676221", "info":{"authors":{"author":[{"@pid":"92/3734","text":"Orazio Gallo"},{"@pid":"66/6314","text":"Alejandro J. Troccoli"},{"@pid":"28/441-7","text":"Jun Hu 0007"},{"@pid":"61/5171","text":"Kari Pulli"},{"@pid":"48/6214","text":"Jan Kautz"}]},"title":"Locally Non-rigid Registration for Mobile HDR Photography.","venue":"CoRR","volume":"abs/1504.01441","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GalloTHPK15","ee":"http://arxiv.org/abs/1504.01441","url":"https://dblp.org/rec/journals/corr/GalloTHPK15"}, "url":"URL#3676221" }, { "@score":"1", "@id":"3676226", "info":{"authors":{"author":[{"@pid":"68/8579","text":"Dorian Gálvez-López"},{"@pid":"155/1909","text":"Marta Salas"},{"@pid":"79/1860","text":"Juan D. Tardós"},{"@pid":"22/5371","text":"J. M. M. Montiel"}]},"title":"Real-time Monocular Object SLAM.","venue":"CoRR","volume":"abs/1504.02398","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Galvez-LopezSTM15","ee":"http://arxiv.org/abs/1504.02398","url":"https://dblp.org/rec/journals/corr/Galvez-LopezSTM15"}, "url":"URL#3676226" }, { "@score":"1", "@id":"3676233", "info":{"authors":{"author":[{"@pid":"22/11289","text":"Lucia Valentina Gambuzza"},{"@pid":"46/6763","text":"Luigi Fortuna"},{"@pid":"19/1859","text":"Mattia Frasca"},{"@pid":"44/9883","text":"Ella Gale"}]},"title":"Experimental evidence of chaos from memristors.","venue":"CoRR","volume":"abs/1504.06537","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GambuzzaFFG15","ee":"http://arxiv.org/abs/1504.06537","url":"https://dblp.org/rec/journals/corr/GambuzzaFFG15"}, "url":"URL#3676233" }, { "@score":"1", "@id":"3676239", "info":{"authors":{"author":[{"@pid":"160/7709","text":"Moses Ganardi"},{"@pid":"149/2662","text":"Danny Hucke"},{"@pid":"76/1674","text":"Markus Lohrey"},{"@pid":"131/7298","text":"Eric Noeth"}]},"title":"Tree compression using string grammars.","venue":"CoRR","volume":"abs/1504.05535","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GanardiHLN15","ee":"http://arxiv.org/abs/1504.05535","url":"https://dblp.org/rec/journals/corr/GanardiHLN15"}, "url":"URL#3676239" }, { "@score":"1", "@id":"3676243", "info":{"authors":{"author":[{"@pid":"83/6972-1","text":"Karthik Ganesan 0001"},{"@pid":"54/5626","text":"Pulkit Grover"},{"@pid":"r/JMRabaey","text":"Jan M. Rabaey"},{"@pid":"g/AndreaJGoldsmith","text":"Andrea J. Goldsmith"}]},"title":"Towards Approaching Total-Power-Capacity: Transmit and Decoding Power Minimization for LDPC Codes.","venue":"CoRR","volume":"abs/1504.01019","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GanesanGRG15","ee":"http://arxiv.org/abs/1504.01019","url":"https://dblp.org/rec/journals/corr/GanesanGRG15"}, "url":"URL#3676243" }, { "@score":"1", "@id":"3676247", "info":{"authors":{"author":{"@pid":"162/0233","text":"Subodh Gangan"}},"title":"A Review of Man-in-the-Middle Attacks.","venue":"CoRR","volume":"abs/1504.02115","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gangan15","ee":"http://arxiv.org/abs/1504.02115","url":"https://dblp.org/rec/journals/corr/Gangan15"}, "url":"URL#3676247" }, { "@score":"1", "@id":"3676305", "info":{"authors":{"author":[{"@pid":"152/6672","text":"Bin-Bin Gao"},{"@pid":"160/5936","text":"Xiu-Shen Wei"},{"@pid":"w/JianxinWu","text":"Jianxin Wu 0001"},{"@pid":"42/6095","text":"Weiyao Lin"}]},"title":"Deep Spatial Pyramid: The Devil is Once Again in the Details.","venue":"CoRR","volume":"abs/1504.05277","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoWWL15","ee":"http://arxiv.org/abs/1504.05277","url":"https://dblp.org/rec/journals/corr/GaoWWL15"}, "url":"URL#3676305" }, { "@score":"1", "@id":"3676306", "info":{"authors":{"author":[{"@pid":"35/7230","text":"Bing Gao"},{"@pid":"w/YangWang20","text":"Yang Wang 0020"},{"@pid":"72/51","text":"Zhiqiang Xu"}]},"title":"Stable Signal Recovery from Phaseless Measurements.","venue":"CoRR","volume":"abs/1504.01085","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoWX15","ee":"http://arxiv.org/abs/1504.01085","url":"https://dblp.org/rec/journals/corr/GaoWX15"}, "url":"URL#3676306" }, { "@score":"1", "@id":"3676308", "info":{"authors":{"author":[{"@pid":"146/2661","text":"Zhimin Gao"},{"@pid":"w/LeiWang1","text":"Lei Wang 0001"},{"@pid":"45/933","text":"Luping Zhou"},{"@pid":"135/4880","text":"Jianjia Zhang"}]},"title":"HEp-2 Cell Image Classification with Deep Convolutional Neural Networks.","venue":"CoRR","volume":"abs/1504.02531","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GaoWZZ15","ee":"http://arxiv.org/abs/1504.02531","url":"https://dblp.org/rec/journals/corr/GaoWZZ15"}, "url":"URL#3676308" }, { "@score":"1", "@id":"3676359", "info":{"authors":{"author":[{"@pid":"116/4982","text":"William C. Garrison III"},{"@pid":"62/1373","text":"Adam J. Lee"}]},"title":"Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version).","venue":"CoRR","volume":"abs/1504.07948","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GarrisonL15","ee":"http://arxiv.org/abs/1504.07948","url":"https://dblp.org/rec/journals/corr/GarrisonL15"}, "url":"URL#3676359" }, { "@score":"1", "@id":"3676364", "info":{"authors":{"author":[{"@pid":"g/LeszekGasieniec","text":"Leszek Gasieniec"},{"@pid":"74/441","text":"Tomasz Jurdzinski"},{"@pid":"m/RussellAMartin","text":"Russell Martin"},{"@pid":"84/2024","text":"Grzegorz Stachowiak"}]},"title":"Deterministic Symmetry Breaking in Ring Networks.","venue":"CoRR","volume":"abs/1504.07127","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GasieniecJMS15","ee":"http://arxiv.org/abs/1504.07127","url":"https://dblp.org/rec/journals/corr/GasieniecJMS15"}, "url":"URL#3676364" }, { "@score":"1", "@id":"3676395", "info":{"authors":{"author":[{"@pid":"125/8500","text":"Ruth Olimpia Garcia Gavilanes"},{"@pid":"162/0231","text":"Diego Gómez"},{"@pid":"09/7458","text":"Denis Parra"},{"@pid":"94/8283","text":"Christoph Trattner"},{"@pid":"16/5161","text":"Andreas Kaltenbrunner"},{"@pid":"132/8956","text":"Eduardo Graells-Garrido"}]},"title":"Language, Twitter and Academic Conferences.","venue":"CoRR","volume":"abs/1504.03374","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GavilanesGPTKG15","ee":"http://arxiv.org/abs/1504.03374","url":"https://dblp.org/rec/journals/corr/GavilanesGPTKG15"}, "url":"URL#3676395" }, { "@score":"1", "@id":"3676412", "info":{"authors":{"author":[{"@pid":"89/6869-1","text":"Rong Ge 0001"},{"@pid":"54/9061","text":"Tengyu Ma 0001"}]},"title":"Decomposing Overcomplete 3rd Order Tensors using Sum-of-Squares Algorithms.","venue":"CoRR","volume":"abs/1504.05287","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeM15","ee":"http://arxiv.org/abs/1504.05287","url":"https://dblp.org/rec/journals/corr/GeM15"}, "url":"URL#3676412" }, { "@score":"1", "@id":"3676429", "info":{"authors":{"author":[{"@pid":"47/2555","text":"Jim Geelen"},{"@pid":"34/8184","text":"Rohan Kapadia"}]},"title":"Computing girth and cogirth in perturbed graphic matroids.","venue":"CoRR","volume":"abs/1504.07647","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeelenK15","ee":"http://arxiv.org/abs/1504.07647","url":"https://dblp.org/rec/journals/corr/GeelenK15"}, "url":"URL#3676429" }, { "@score":"1", "@id":"3676451", "info":{"authors":{"author":[{"@pid":"122/9006","text":"Konstantinos Georgatzis"},{"@pid":"w/ChristopherKIWilliams","text":"Christopher K. I. Williams"}]},"title":"Discriminative Switching Linear Dynamical Systems applied to Physiological Condition Monitoring.","venue":"CoRR","volume":"abs/1504.06494","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeorgatzisW15","ee":"http://arxiv.org/abs/1504.06494","url":"https://dblp.org/rec/journals/corr/GeorgatzisW15"}, "url":"URL#3676451" }, { "@score":"1", "@id":"3676459", "info":{"authors":{"author":[{"@pid":"13/55","text":"Leonidas Georgiadis"},{"@pid":"80/7475","text":"George Iosifidis"},{"@pid":"03/3843","text":"Leandros Tassiulas"}]},"title":"Exchange of Services in Networks: Competition, Cooperation, and Fairness.","venue":"CoRR","volume":"abs/1504.02052","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeorgiadisIT15","ee":"http://arxiv.org/abs/1504.02052","url":"https://dblp.org/rec/journals/corr/GeorgiadisIT15"}, "url":"URL#3676459" }, { "@score":"1", "@id":"3676467", "info":{"authors":{"author":[{"@pid":"61/10358","text":"Orestis Georgiou"},{"@pid":"159/1724","text":"Camly Nguyen"}]},"title":"Multihop connectivity of ad hoc networks with randomly oriented directional antennas.","venue":"CoRR","volume":"abs/1504.01879","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeorgiouN15","ee":"http://arxiv.org/abs/1504.01879","url":"https://dblp.org/rec/journals/corr/GeorgiouN15"}, "url":"URL#3676467" }, { "@score":"1", "@id":"3676468", "info":{"authors":{"author":[{"@pid":"61/10358","text":"Orestis Georgiou"},{"@pid":"62/3650","text":"Shanshan Wang"},{"@pid":"97/7910","text":"Mohammud Z. Bocus"},{"@pid":"66/10357","text":"Carl P. Dettmann"},{"@pid":"78/2259","text":"Justin P. Coon"}]},"title":"Location, location, location: Border effects in interference limited ad hoc networks.","venue":"CoRR","volume":"abs/1504.01873","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeorgiouWBDC15","ee":"http://arxiv.org/abs/1504.01873","url":"https://dblp.org/rec/journals/corr/GeorgiouWBDC15"}, "url":"URL#3676468" }, { "@score":"1", "@id":"3676470", "info":{"authors":{"author":[{"@pid":"161/9861","text":"Leo N. Geppert"},{"@pid":"66/6708","text":"Katja Ickstadt"},{"@pid":"145/3380","text":"Alexander Munteanu"},{"@pid":"162/0226","text":"Jens Quedenfeld"},{"@pid":"47/2482","text":"Christian Sohler"}]},"title":"Random projections for Bayesian regression.","venue":"CoRR","volume":"abs/1504.06122","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GeppertIMQS15","ee":"http://arxiv.org/abs/1504.06122","url":"https://dblp.org/rec/journals/corr/GeppertIMQS15"}, "url":"URL#3676470" }, { "@score":"1", "@id":"3676476", "info":{"authors":{"author":[{"@pid":"144/7776","text":"Balázs Gerencsér"},{"@pid":"88/6313","text":"Julien M. Hendrickx"}]},"title":"Push sum with transmission failures.","venue":"CoRR","volume":"abs/1504.08193","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GerencserH15","ee":"http://arxiv.org/abs/1504.08193","url":"https://dblp.org/rec/journals/corr/GerencserH15"}, "url":"URL#3676476" }, { "@score":"1", "@id":"3676513", "info":{"authors":{"author":{"@pid":"137/6087","text":"Samah A. M. Ghanem"}},"title":"Multiuser I-MMSE.","venue":"CoRR","volume":"abs/1504.06884","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ghanem15","ee":"http://arxiv.org/abs/1504.06884","url":"https://dblp.org/rec/journals/corr/Ghanem15"}, "url":"URL#3676513" }, { "@score":"1", "@id":"3676548", "info":{"authors":{"author":[{"@pid":"162/0166","text":"Behrooz Ghorbani"},{"@pid":"63/1000","text":"Özgür Yilmaz"}]},"title":"Sparse regression with highly correlated predictors.","venue":"CoRR","volume":"abs/1504.00984","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhorbaniY15","ee":"http://arxiv.org/abs/1504.00984","url":"https://dblp.org/rec/journals/corr/GhorbaniY15"}, "url":"URL#3676548" }, { "@score":"1", "@id":"3676556", "info":{"authors":{"author":[{"@pid":"34/8285","text":"Arnob Ghosh"},{"@pid":"34/4059","text":"Saswati Sarkar"}]},"title":"Strategic Interaction Among Different Entities in Internet of Things.","venue":"CoRR","volume":"abs/1504.02926","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GhoshS15","ee":"http://arxiv.org/abs/1504.02926","url":"https://dblp.org/rec/journals/corr/GhoshS15"}, "url":"URL#3676556" }, { "@score":"1", "@id":"3676567", "info":{"authors":{"author":[{"@pid":"134/0138","text":"Paris Giampouras"},{"@pid":"08/8763","text":"Konstantinos Themelis"},{"@pid":"33/4608","text":"Athanasios A. Rontogiannis"},{"@pid":"08/381","text":"Konstantinos Koutroumbas"}]},"title":"Simultaneously sparse and low-rank abundance matrix estimation for hyperspectral image unmixing.","venue":"CoRR","volume":"abs/1504.01515","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiampourasTRK15","ee":"http://arxiv.org/abs/1504.01515","url":"https://dblp.org/rec/journals/corr/GiampourasTRK15"}, "url":"URL#3676567" }, { "@score":"1", "@id":"3676574", "info":{"authors":{"author":[{"@pid":"121/2512","text":"Pascal Giard"},{"@pid":"79/7883","text":"Gabi Sarkis"},{"@pid":"60/4351","text":"Camille Leroux"},{"@pid":"89/549","text":"Claude Thibeault"},{"@pid":"15/860","text":"Warren J. Gross"}]},"title":"Low-Latency Software Polar Decoders.","venue":"CoRR","volume":"abs/1504.00353","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiardSLTG15","ee":"http://arxiv.org/abs/1504.00353","url":"https://dblp.org/rec/journals/corr/GiardSLTG15"}, "url":"URL#3676574" }, { "@score":"1", "@id":"3676583", "info":{"authors":{"author":[{"@pid":"20/292","text":"Matt Gibson 0001"},{"@pid":"59/4585","text":"Erik Krohn"},{"@pid":"97/6505-13","text":"Qing Wang 0013"}]},"title":"A Characterization of Visibility Graphs for Pseudo-Polygons.","venue":"CoRR","volume":"abs/1504.06350","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GibsonKW15","ee":"http://arxiv.org/abs/1504.06350","url":"https://dblp.org/rec/journals/corr/GibsonKW15"}, "url":"URL#3676583" }, { "@score":"1", "@id":"3676602", "info":{"authors":{"author":[{"@pid":"172/4707","text":"Rajan J. Gill"},{"@pid":"07/3042","text":"Dana Kulic"},{"@pid":"67/7142","text":"Christopher Nielsen"}]},"title":"Spline Path Following for Redundant Mechanical Systems.","venue":"CoRR","volume":"abs/1504.06917","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GillKN15","ee":"http://arxiv.org/abs/1504.06917","url":"https://dblp.org/rec/journals/corr/GillKN15"}, "url":"URL#3676602" }, { "@score":"1", "@id":"3676624", "info":{"authors":{"author":{"@pid":"89/7658","text":"Ross B. Girshick"}},"title":"Fast R-CNN.","venue":"CoRR","volume":"abs/1504.08083","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Girshick15","ee":"http://arxiv.org/abs/1504.08083","url":"https://dblp.org/rec/journals/corr/Girshick15"}, "url":"URL#3676624" }, { "@score":"1", "@id":"3676625", "info":{"authors":{"author":[{"@pid":"50/7998","text":"Raja Giryes"},{"@pid":"82/5175","text":"Guillermo Sapiro"},{"@pid":"77/3198","text":"Alexander M. Bronstein"}]},"title":"Deep Neural Networks with Random Gaussian Weights: A Universal Classification Strategy?","venue":"CoRR","volume":"abs/1504.08291","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GiryesSB15","ee":"http://arxiv.org/abs/1504.08291","url":"https://dblp.org/rec/journals/corr/GiryesSB15"}, "url":"URL#3676625" }, { "@score":"1", "@id":"3676632", "info":{"authors":{"author":[{"@pid":"36/6453","text":"Nikolaos Gkalelis"},{"@pid":"80/6216","text":"Vasileios Mezaris"}]},"title":"Accelerated nonlinear discriminant analysis.","venue":"CoRR","volume":"abs/1504.07000","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GkalelisM15","ee":"http://arxiv.org/abs/1504.07000","url":"https://dblp.org/rec/journals/corr/GkalelisM15"}, "url":"URL#3676632" }, { "@score":"1", "@id":"3676643", "info":{"authors":{"author":[{"@pid":"135/6411","text":"Stefan Gladisch"},{"@pid":"146/6253","text":"Ulrike Kister"},{"@pid":"t/ChristianTominski","text":"Christian Tominski"},{"@pid":"45/4302","text":"Raimund Dachselt"},{"@pid":"s/HeidrunSchumann","text":"Heidrun Schumann"}]},"title":"Mapping Tasks to Interactions for Graph Exploration and Graph Editing on Interactive Surfaces.","venue":"CoRR","volume":"abs/1504.07844","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GladischKTDS15","ee":"http://arxiv.org/abs/1504.07844","url":"https://dblp.org/rec/journals/corr/GladischKTDS15"}, "url":"URL#3676643" }, { "@score":"1", "@id":"3676646", "info":{"authors":{"author":[{"@pid":"g/ChristianGlasser","text":"Christian Glaßer"},{"@pid":"j/PeterJonsson","text":"Peter Jonsson"},{"@pid":"00/757","text":"Barnaby Martin"}]},"title":"Constraint Satisfaction Problems around Skolem Arithmetic.","venue":"CoRR","volume":"abs/1504.04181","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GlasserJM15","ee":"http://arxiv.org/abs/1504.04181","url":"https://dblp.org/rec/journals/corr/GlasserJM15"}, "url":"URL#3676646" }, { "@score":"1", "@id":"3676648", "info":{"authors":{"author":{"@pid":"117/3630","text":"Patrick Oliver Glauner"}},"title":"Comparison of Training Methods for Deep Neural Networks.","venue":"CoRR","volume":"abs/1504.06825","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Glauner15","ee":"http://arxiv.org/abs/1504.06825","url":"https://dblp.org/rec/journals/corr/Glauner15"}, "url":"URL#3676648" }, { "@score":"1", "@id":"3676692", "info":{"authors":{"author":{"@pid":"48/2412","text":"Jennifer Golbeck"}},"title":"Benford's Law Applies To Online Social Networks.","venue":"CoRR","volume":"abs/1504.04387","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Golbeck15","ee":"http://arxiv.org/abs/1504.04387","url":"https://dblp.org/rec/journals/corr/Golbeck15"}, "url":"URL#3676692" }, { "@score":"1", "@id":"3676702", "info":{"authors":{"author":[{"@pid":"119/3922","text":"Ziv Goldfeld"},{"@pid":"04/1411","text":"Gerhard Kramer"},{"@pid":"88/4362","text":"Haim H. Permuter"}]},"title":"Broadcast Channels with Privacy Leakage Constraints.","venue":"CoRR","volume":"abs/1504.06136","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoldfeldKP15","ee":"http://arxiv.org/abs/1504.06136","url":"https://dblp.org/rec/journals/corr/GoldfeldKP15"}, "url":"URL#3676702" }, { "@score":"1", "@id":"3676706", "info":{"authors":{"author":[{"@pid":"25/8184","text":"Tom Goldstein"},{"@pid":"37/142","text":"Gavin Taylor"},{"@pid":"161/9974","text":"Kawika Barabin"},{"@pid":"34/4847","text":"Kent Sayre"}]},"title":"Unwrapping ADMM: Efficient Distributed Computing via Transpose Reduction.","venue":"CoRR","volume":"abs/1504.02147","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoldsteinTBS15","ee":"http://arxiv.org/abs/1504.02147","url":"https://dblp.org/rec/journals/corr/GoldsteinTBS15"}, "url":"URL#3676706" }, { "@score":"1", "@id":"3676716", "info":{"authors":{"author":[{"@pid":"26/4550","text":"Faruk Göloglu"},{"@pid":"21/5442","text":"Jüri Lember"},{"@pid":"137/8478","text":"Ago-Erik Riet"},{"@pid":"01/319","text":"Vitaly Skachek"}]},"title":"New Bounds for Permutation Codes in Ulam Metric.","venue":"CoRR","volume":"abs/1504.05100","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GologluLRS15","ee":"http://arxiv.org/abs/1504.05100","url":"https://dblp.org/rec/journals/corr/GologluLRS15"}, "url":"URL#3676716" }, { "@score":"1", "@id":"3676726", "info":{"authors":{"author":[{"@pid":"55/8559","text":"Omar S. Gómez"},{"@pid":"a/RaulAAguilar","text":"Raúl A. Aguilar"},{"@pid":"161/9980","text":"Juan P. Ucán"}]},"title":"Efectividad de técnicas de prueba de software aplicadas por sujetos novicios de pregrado.","venue":"CoRR","volume":"abs/1504.08052","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GomezAU15","ee":"http://arxiv.org/abs/1504.08052","url":"https://dblp.org/rec/journals/corr/GomezAU15"}, "url":"URL#3676726" }, { "@score":"1", "@id":"3676734", "info":{"authors":{"author":[{"@pid":"162/0136","text":"Rawlinson S. Gonçalves"},{"@pid":"04/562","text":"Raimundo da Silva Barreto"}]},"title":"State of the Art of the Intra-Task Dynamic Voltage and Frequency Scaling Technique.","venue":"CoRR","volume":"abs/1504.06177","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GoncalvesB15","ee":"http://arxiv.org/abs/1504.06177","url":"https://dblp.org/rec/journals/corr/GoncalvesB15"}, "url":"URL#3676734" }, { "@score":"1", "@id":"3676752", "info":{"authors":{"author":[{"@pid":"55/7819","text":"Elias Gonzalez"},{"@pid":"95/10929","text":"Robert S. Balog"},{"@pid":"09/3354","text":"Laszlo B. Kish"}]},"title":"Resource requirements and speed versus geometry of unconditionally secure physical key exchanges.","venue":"CoRR","volume":"abs/1504.06541","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GonzalezBK15","ee":"http://arxiv.org/abs/1504.06541","url":"https://dblp.org/rec/journals/corr/GonzalezBK15"}, "url":"URL#3676752" }, { "@score":"1", "@id":"3676765", "info":{"authors":{"author":[{"@pid":"16/1585","text":"Parikshit Gopalan"},{"@pid":"n/NoamNisan","text":"Noam Nisan"},{"@pid":"r/TimRoughgarden","text":"Tim Roughgarden"}]},"title":"Public projects, Boolean functions and the borders of Border's theorem.","venue":"CoRR","volume":"abs/1504.07687","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GopalanNR15","ee":"http://arxiv.org/abs/1504.07687","url":"https://dblp.org/rec/journals/corr/GopalanNR15"}, "url":"URL#3676765" }, { "@score":"1", "@id":"3676774", "info":{"authors":{"author":[{"@pid":"162/0156","text":"Nikita Gordienko"},{"@pid":"91/6964","text":"Oleg Lodygensky"},{"@pid":"34/3862","text":"Gilles Fedak"},{"@pid":"144/7688","text":"Yuri G. Gordienko"}]},"title":"Synergy of Volunteer Measurements and Volunteer Computing for Effective Data Collecting, Processing, Simulating and Analyzing on a Worldwide Scale.","venue":"CoRR","volume":"abs/1504.00806","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GordienkoLFG15","ee":"http://arxiv.org/abs/1504.00806","url":"https://dblp.org/rec/journals/corr/GordienkoLFG15"}, "url":"URL#3676774" }, { "@score":"1", "@id":"3676775", "info":{"authors":{"author":[{"@pid":"144/7688","text":"Yuri G. Gordienko"},{"@pid":"43/10477","text":"Sergii G. Stirenko"},{"@pid":"144/7351","text":"Olexander Gatsenko"},{"@pid":"144/7519","text":"Lev Bekenov"}]},"title":"Science Gateway for Distributed Multiscale Course Management in e-Science and e-Learning - Use Case for Study and Investigation of Functionalized Nanomaterials.","venue":"CoRR","volume":"abs/1504.00802","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GordienkoSGB15","ee":"http://arxiv.org/abs/1504.00802","url":"https://dblp.org/rec/journals/corr/GordienkoSGB15"}, "url":"URL#3676775" }, { "@score":"1", "@id":"3676784", "info":{"authors":{"author":{"@pid":"131/6664","text":"Danila A. Gorodecky"}},"title":"Reed-Muller Realization of X (mod P).","venue":"CoRR","volume":"abs/1504.04773","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gorodecky15","ee":"http://arxiv.org/abs/1504.04773","url":"https://dblp.org/rec/journals/corr/Gorodecky15"}, "url":"URL#3676784" }, { "@score":"1", "@id":"3676798", "info":{"authors":{"author":[{"@pid":"56/6296","text":"Antonis G. Gotsis"},{"@pid":"37/4517","text":"Stelios Stefanatos"},{"@pid":"59/1890","text":"Angeliki Alexiou"}]},"title":"Optimal User Association for Massive MIMO Empowered Ultra-Dense Wireless Networks.","venue":"CoRR","volume":"abs/1504.02346","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GotsisSA15","ee":"http://arxiv.org/abs/1504.02346","url":"https://dblp.org/rec/journals/corr/GotsisSA15"}, "url":"URL#3676798" }, { "@score":"1", "@id":"3676811", "info":{"authors":{"author":{"@pid":"129/3307","text":"James-A. Goulet"}},"title":"The Nataf-Beta Random Field Classifier: An Extension of the Beta Conjugate Prior to Classification Problems.","venue":"CoRR","volume":"abs/1504.04588","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Goulet15","ee":"http://arxiv.org/abs/1504.04588","url":"https://dblp.org/rec/journals/corr/Goulet15"}, "url":"URL#3676811" }, { "@score":"1", "@id":"3676821", "info":{"authors":{"author":[{"@pid":"73/9570","text":"R. Gowri"},{"@pid":"82/9570","text":"R. Rathipriya"}]},"title":"Extraction of Protein Sequence Motif Information using PSO K-Means.","venue":"CoRR","volume":"abs/1504.02235","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GowriR15","ee":"http://arxiv.org/abs/1504.02235","url":"https://dblp.org/rec/journals/corr/GowriR15"}, "url":"URL#3676821" }, { "@score":"1", "@id":"3676863", "info":{"authors":{"author":[{"@pid":"71/6448","text":"Bernardo Cuenca Grau"},{"@pid":"20/4833","text":"Evgeny Kharlamov"},{"@pid":"22/7920","text":"Egor V. Kostylev"},{"@pid":"22/8383","text":"Dmitriy Zheleznyakov"}]},"title":"Controlled Query Evaluation for Datalog and OWL 2 Profile Ontologies.","venue":"CoRR","volume":"abs/1504.06529","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrauKKZ15","ee":"http://arxiv.org/abs/1504.06529","url":"https://dblp.org/rec/journals/corr/GrauKKZ15"}, "url":"URL#3676863" }, { "@score":"1", "@id":"3676896", "info":{"authors":{"author":{"@pid":"52/3171","text":"Michael A. Greminger"}},"title":"Median and Mode Ellipse Parameterization for Robust Contour Fitting.","venue":"CoRR","volume":"abs/1504.05623","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Greminger15","ee":"http://arxiv.org/abs/1504.05623","url":"https://dblp.org/rec/journals/corr/Greminger15"}, "url":"URL#3676896" }, { "@score":"1", "@id":"3676898", "info":{"authors":{"author":[{"@pid":"122/1272","text":"Friedrich Gretz"},{"@pid":"32/8421-1","text":"Nils Jansen 0001"},{"@pid":"39/9937","text":"Benjamin Lucien Kaminski"},{"@pid":"k/JoostPieterKatoen","text":"Joost-Pieter Katoen"},{"@pid":"m/AnnabelleMcIver","text":"Annabelle McIver"},{"@pid":"79/7397","text":"Federico Olmedo"}]},"title":"Conditioning in Probabilistic Programming.","venue":"CoRR","volume":"abs/1504.00198","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GretzJKKMO15","ee":"http://arxiv.org/abs/1504.00198","url":"https://dblp.org/rec/journals/corr/GretzJKKMO15"}, "url":"URL#3676898" }, { "@score":"1", "@id":"3676900", "info":{"authors":{"author":{"@pid":"78/3599","text":"Alexander Gribov"}},"title":"Approximate Fitting of Circular Arcs when Two Points are Known.","venue":"CoRR","volume":"abs/1504.06582","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gribov15","ee":"http://arxiv.org/abs/1504.06582","url":"https://dblp.org/rec/journals/corr/Gribov15"}, "url":"URL#3676900" }, { "@score":"1", "@id":"3676901", "info":{"authors":{"author":{"@pid":"78/3599","text":"Alexander Gribov"}},"title":"Searching for a Compressed Polyline with a Minimum Number of Vertices.","venue":"CoRR","volume":"abs/1504.06584","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gribov15a","ee":"http://arxiv.org/abs/1504.06584","url":"https://dblp.org/rec/journals/corr/Gribov15a"}, "url":"URL#3676901" }, { "@score":"1", "@id":"3676903", "info":{"authors":{"author":[{"@pid":"12/1369","text":"Radu Grigore"},{"@pid":"28/6047","text":"Stefan Kiefer"}]},"title":"Tree Buffers.","venue":"CoRR","volume":"abs/1504.04757","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrigoreK15","ee":"http://arxiv.org/abs/1504.04757","url":"https://dblp.org/rec/journals/corr/GrigoreK15"}, "url":"URL#3676903" }, { "@score":"1", "@id":"3676928", "info":{"authors":{"author":[{"@pid":"75/8239","text":"Ray W. Grout"},{"@pid":"65/10367","text":"Hemanth Kolla"},{"@pid":"74/9747","text":"Michael L. Minion"},{"@pid":"15/7586","text":"John B. Bell"}]},"title":"Achieving algorithmic resilience for temporal integration through spectral deferred corrections.","venue":"CoRR","volume":"abs/1504.01329","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GroutKMB15","ee":"http://arxiv.org/abs/1504.01329","url":"https://dblp.org/rec/journals/corr/GroutKMB15"}, "url":"URL#3676928" }, { "@score":"1", "@id":"3676941", "info":{"authors":{"author":[{"@pid":"144/9790","text":"Rafal Grycuk"},{"@pid":"23/1455","text":"Marcin Gabryel"},{"@pid":"64/2091","text":"Rafal Scherer"},{"@pid":"51/6652","text":"Sviatoslav Voloshynovskiy"}]},"title":"Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database.","venue":"CoRR","volume":"abs/1504.06867","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GrycukGSV15","ee":"http://arxiv.org/abs/1504.06867","url":"https://dblp.org/rec/journals/corr/GrycukGSV15"}, "url":"URL#3676941" }, { "@score":"1", "@id":"3676948", "info":{"authors":{"author":[{"@pid":"39/2741","text":"Wenjun Gu"},{"@pid":"115/6443","text":"Mohammadreza A. Kashani"},{"@pid":"77/5399","text":"Mohsen Kavehrad"}]},"title":"Multipath Reflections Analysis on Indoor Visible Light Positioning System.","venue":"CoRR","volume":"abs/1504.01192","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuKK15","ee":"http://arxiv.org/abs/1504.01192","url":"https://dblp.org/rec/journals/corr/GuKK15"}, "url":"URL#3676948" }, { "@score":"1", "@id":"3676960", "info":{"authors":{"author":{"@pid":"172/1260","text":"Giuliano Gadioli La Guardia"}},"title":"Asymmetric quantum convolutional codes.","venue":"CoRR","volume":"abs/1504.05639","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Guardia15","ee":"http://arxiv.org/abs/1504.05639","url":"https://dblp.org/rec/journals/corr/Guardia15"}, "url":"URL#3676960" }, { "@score":"1", "@id":"3676976", "info":{"authors":{"author":[{"@pid":"93/6223","text":"Stefano Guerrini"},{"@pid":"m/SMartini","text":"Simone Martini 0001"},{"@pid":"51/1554","text":"Andrea Masini"}]},"title":"Towards A Theory Of Quantum Computability.","venue":"CoRR","volume":"abs/1504.02817","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuerriniMM15","ee":"http://arxiv.org/abs/1504.02817","url":"https://dblp.org/rec/journals/corr/GuerriniMM15"}, "url":"URL#3676976" }, { "@score":"1", "@id":"3677001", "info":{"authors":{"author":{"@pid":"132/8925","text":"Alejandro Sánchez Guinea"}},"title":"Deterministic Polynomial Solution for NP by an Abstractional Machine.","venue":"CoRR","volume":"abs/1504.00337","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Guinea15","ee":"http://arxiv.org/abs/1504.00337","url":"https://dblp.org/rec/journals/corr/Guinea15"}, "url":"URL#3677001" }, { "@score":"1", "@id":"3677011", "info":{"authors":{"author":[{"@pid":"137/7892","text":"Hendra Gunadi"},{"@pid":"t/AlwenTiu","text":"Alwen Tiu"},{"@pid":"g/RajeevGore","text":"Rajeev Goré"}]},"title":"Formal Certification of Android Bytecode.","venue":"CoRR","volume":"abs/1504.01842","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GunadiTG15","ee":"http://arxiv.org/abs/1504.01842","url":"https://dblp.org/rec/journals/corr/GunadiTG15"}, "url":"URL#3677011" }, { "@score":"1", "@id":"3677018", "info":{"authors":{"author":{"@pid":"161/9925","text":"Rupesh Gunturu"}},"title":"Survey of Sybil Attacks in Social Networks.","venue":"CoRR","volume":"abs/1504.05522","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gunturu15","ee":"http://arxiv.org/abs/1504.05522","url":"https://dblp.org/rec/journals/corr/Gunturu15"}, "url":"URL#3677018" }, { "@score":"1", "@id":"3677037", "info":{"authors":{"author":[{"@pid":"95/9687","text":"Longkun Guo"},{"@pid":"04/8278","text":"Kewen Liao"},{"@pid":"74/3247-1","text":"Hong Shen 0001"},{"@pid":"83/6353","text":"Peng Li"}]},"title":"Efficient Approximation Algorithms for Computing \\emph{k} Disjoint Restricted Shortest Paths.","venue":"CoRR","volume":"abs/1504.05519","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoLSL15","ee":"http://arxiv.org/abs/1504.05519","url":"https://dblp.org/rec/journals/corr/GuoLSL15"}, "url":"URL#3677037" }, { "@score":"1", "@id":"3677042", "info":{"authors":{"author":[{"@pid":"65/7485","text":"Xueying Guo"},{"@pid":"74/5590-1","text":"Rahul Singh 0001"},{"@pid":"83/4027","text":"P. R. Kumar 0001"},{"@pid":"51/2196","text":"Zhisheng Niu"}]},"title":"A High Reliability Asymptotic Approach for Packet Inter-Delivery Time Optimization in Cyber-Physical Systems.","venue":"CoRR","volume":"abs/1504.03076","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoSKN15a","ee":"http://arxiv.org/abs/1504.03076","url":"https://dblp.org/rec/journals/corr/GuoSKN15a"}, "url":"URL#3677042" }, { "@score":"1", "@id":"3677044", "info":{"authors":{"author":[{"@pid":"67/398","text":"Qi Guo"},{"@pid":"05/10698","text":"Zixuan Wang"},{"@pid":"181/2821","text":"Ming Li"},{"@pid":"23/1305","text":"Hamid K. Aghajan"}]},"title":"Intelligent Health Recommendation System for Computer Users.","venue":"CoRR","volume":"abs/1504.07858","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoWLA15","ee":"http://arxiv.org/abs/1504.07858","url":"https://dblp.org/rec/journals/corr/GuoWLA15"}, "url":"URL#3677044" }, { "@score":"1", "@id":"3677046", "info":{"authors":{"author":[{"@pid":"18/5331-1","text":"Qinghua Guo 0001"},{"@pid":"06/4004","text":"Jiangtao Xi"}]},"title":"Approximate Message Passing with Unitary Transformation.","venue":"CoRR","volume":"abs/1504.04799","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoX15","ee":"http://arxiv.org/abs/1504.04799","url":"https://dblp.org/rec/journals/corr/GuoX15"}, "url":"URL#3677046" }, { "@score":"1", "@id":"3677048", "info":{"authors":{"author":[{"@pid":"78/7198","text":"Ruiqi Guo"},{"@pid":"138/1927","text":"Chuhang Zou"},{"@pid":"08/6948","text":"Derek Hoiem"}]},"title":"Predicting Complete 3D Models of Indoor Scenes.","venue":"CoRR","volume":"abs/1504.02437","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoZH15","ee":"http://arxiv.org/abs/1504.02437","url":"https://dblp.org/rec/journals/corr/GuoZH15"}, "url":"URL#3677048" }, { "@score":"1", "@id":"3677049", "info":{"authors":{"author":[{"@pid":"08/3722","text":"Hongyu Guo"},{"@pid":"93/310","text":"Xiaodan Zhu 0001"},{"@pid":"29/7048","text":"Martin Renqiang Min"}]},"title":"A Deep Learning Model for Structured Outputs with High-order Interaction.","venue":"CoRR","volume":"abs/1504.08022","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoZM15","ee":"http://arxiv.org/abs/1504.08022","url":"https://dblp.org/rec/journals/corr/GuoZM15"}, "url":"URL#3677049" }, { "@score":"1", "@id":"3677050", "info":{"authors":{"author":[{"@pid":"95/9687","text":"Longkun Guo"},{"@pid":"80/773","text":"Wenxing Zhu"},{"@pid":"74/3247-1","text":"Hong Shen 0001"}]},"title":"Efficient Approximation Algorithms for the Largest Weight Data Retrieval Problem.","venue":"CoRR","volume":"abs/1504.04679","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuoZS15","ee":"http://arxiv.org/abs/1504.04679","url":"https://dblp.org/rec/journals/corr/GuoZS15"}, "url":"URL#3677050" }, { "@score":"1", "@id":"3677081", "info":{"authors":{"author":[{"@pid":"45/10343","text":"Nitish Gupta"},{"@pid":"13/3568-1","text":"Sameer Singh 0001"}]},"title":"Collectively Embedding Multi-Relational Data for Predicting User Preferences.","venue":"CoRR","volume":"abs/1504.06165","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GuptaS15","ee":"http://arxiv.org/abs/1504.06165","url":"https://dblp.org/rec/journals/corr/GuptaS15"}, "url":"URL#3677081" }, { "@score":"1", "@id":"3677104", "info":{"authors":{"author":[{"@pid":"161/4522","text":"Andrey Gushchin"},{"@pid":"75/6446","text":"Anwar Walid"},{"@pid":"85/4619","text":"Ao Tang"}]},"title":"Scalable Routing in SDN-enabled Networks with Consolidated Middleboxes.","venue":"CoRR","volume":"abs/1504.01771","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GushchinWT15","ee":"http://arxiv.org/abs/1504.01771","url":"https://dblp.org/rec/journals/corr/GushchinWT15"}, "url":"URL#3677104" }, { "@score":"1", "@id":"3677105", "info":{"authors":{"author":[{"@pid":"47/4951","text":"Carl Gustafson"},{"@pid":"96/10095","text":"Taimoor Abbas"},{"@pid":"37/8019","text":"David Bolin"},{"@pid":"06/5372","text":"Fredrik Tufvesson"}]},"title":"Statistical Modeling and Estimation of Censored Pathloss Data.","venue":"CoRR","volume":"abs/1504.03977","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GustafsonABT15","ee":"http://arxiv.org/abs/1504.03977","url":"https://dblp.org/rec/journals/corr/GustafsonABT15"}, "url":"URL#3677105" }, { "@score":"1", "@id":"3677109", "info":{"authors":{"author":[{"@pid":"20/8195","text":"Ismael Gutiérrez"},{"@pid":"162/0208","text":"Ivan Molina"}]},"title":"Some constructions of subspaces cyclic and quasi-cyclic codes.","venue":"CoRR","volume":"abs/1504.04553","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/GutierrezM15","ee":"http://arxiv.org/abs/1504.04553","url":"https://dblp.org/rec/journals/corr/GutierrezM15"}, "url":"URL#3677109" }, { "@score":"1", "@id":"3677119", "info":{"authors":{"author":{"@pid":"17/8035","text":"Laszlo Gyongyosi"}},"title":"Gaussian Quadrature Inference for Multicarrier Continuous-Variable Quantum Key Distribution.","venue":"CoRR","volume":"abs/1504.05574","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Gyongyosi15","ee":"http://arxiv.org/abs/1504.05574","url":"https://dblp.org/rec/journals/corr/Gyongyosi15"}, "url":"URL#3677119" }, { "@score":"1", "@id":"3677122", "info":{"authors":{"author":[{"@pid":"142/8606","text":"Thanh-Le Ha"},{"@pid":"120/0365","text":"Jan Niehues"},{"@pid":"08/2456","text":"Alex Waibel"}]},"title":"Lexical Translation Model Using a Deep Neural Network Architecture.","venue":"CoRR","volume":"abs/1504.07395","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaNW15","ee":"http://arxiv.org/abs/1504.07395","url":"https://dblp.org/rec/journals/corr/HaNW15"}, "url":"URL#3677122" }, { "@score":"1", "@id":"3677129", "info":{"authors":{"author":{"@pid":"10/3456","text":"Eben M. Haber"}},"title":"On the Stability of Online Language Features: How Much Text do you Need to know a Person?","venue":"CoRR","volume":"abs/1504.06391","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haber15","ee":"http://arxiv.org/abs/1504.06391","url":"https://dblp.org/rec/journals/corr/Haber15"}, "url":"URL#3677129" }, { "@score":"1", "@id":"3677135", "info":{"authors":{"author":[{"@pid":"129/8044","text":"Jad Hachem"},{"@pid":"27/488","text":"Nikhil Karamchandani"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Effect of Number of Users in Multi-level Coded Caching.","venue":"CoRR","volume":"abs/1504.05931","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HachemKD15","ee":"http://arxiv.org/abs/1504.05931","url":"https://dblp.org/rec/journals/corr/HachemKD15"}, "url":"URL#3677135" }, { "@score":"1", "@id":"3677136", "info":{"authors":{"author":[{"@pid":"99/6458","text":"Walid Hachem"},{"@pid":"25/5609","text":"Aris L. Moustakas"},{"@pid":"84/5768","text":"Leonid Pastur"}]},"title":"The Shannon's mutual information of a multiple antenna time and frequency dependent channel: an ergodic operator approach.","venue":"CoRR","volume":"abs/1504.00847","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HachemMP15","ee":"http://arxiv.org/abs/1504.00847","url":"https://dblp.org/rec/journals/corr/HachemMP15"}, "url":"URL#3677136" }, { "@score":"1", "@id":"3677148", "info":{"authors":{"author":[{"@pid":"18/4935","text":"Fatima Zohra Hadjam"},{"@pid":"m/ClaudioMoraga","text":"Claudio Moraga"}]},"title":"A symbolic calculus for a class of quantum computing circuits.","venue":"CoRR","volume":"abs/1504.06983","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HadjamM15","ee":"http://arxiv.org/abs/1504.06983","url":"https://dblp.org/rec/journals/corr/HadjamM15"}, "url":"URL#3677148" }, { "@score":"1", "@id":"3677151", "info":{"authors":{"author":[{"@pid":"118/7632","text":"Elena Hadzieva"},{"@pid":"162/0096","text":"Marija Shuminoska"}]},"title":"Real-time Tool for Affine Transformations of Two Dimensional IFS Fractals.","venue":"CoRR","volume":"abs/1504.02744","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HadzievaS15","ee":"http://arxiv.org/abs/1504.02744","url":"https://dblp.org/rec/journals/corr/HadzievaS15"}, "url":"URL#3677151" }, { "@score":"1", "@id":"3677152", "info":{"authors":{"author":[{"@pid":"118/7632","text":"Elena Hadzieva"},{"@pid":"18/11199","text":"Aleksandar Simevski"}]},"title":"Theoretical Aspects of a Design Method for Programmable NMR Voters.","venue":"CoRR","volume":"abs/1504.05692","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HadzievaS15a","ee":"http://arxiv.org/abs/1504.05692","url":"https://dblp.org/rec/journals/corr/HadzievaS15a"}, "url":"URL#3677152" }, { "@score":"1", "@id":"3677171", "info":{"authors":{"author":[{"@pid":"85/8603","text":"Ahmad Abu Al Haija"},{"@pid":"39/10043","text":"Peng Zhong"},{"@pid":"91/3260","text":"Mai Vu"}]},"title":"Decode-Forward Transmission for the Two-Way Relay Channels.","venue":"CoRR","volume":"abs/1504.07495","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaijaZV15","ee":"http://arxiv.org/abs/1504.07495","url":"https://dblp.org/rec/journals/corr/HaijaZV15"}, "url":"URL#3677171" }, { "@score":"1", "@id":"3677194", "info":{"authors":{"author":[{"@pid":"h/JAlexHalderman","text":"J. Alex Halderman"},{"@pid":"t/VanessaTeague","text":"Vanessa Teague"}]},"title":"The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election.","venue":"CoRR","volume":"abs/1504.05646","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaldermanT15","ee":"http://arxiv.org/abs/1504.05646","url":"https://dblp.org/rec/journals/corr/HaldermanT15"}, "url":"URL#3677194" }, { "@score":"1", "@id":"3677199", "info":{"authors":{"author":[{"@pid":"129/1679","text":"Oualid El Halimi"},{"@pid":"161/9901","text":"Trith Patel"},{"@pid":"156/0297","text":"Zohaib S. Kiyani"},{"@pid":"13/3352","text":"Naresh Kumar"},{"@pid":"53/9927","text":"Ankit Singh"}]},"title":"Comparative Stability of Cloned and Non-cloned Code: A Replication Study.","venue":"CoRR","volume":"abs/1504.07713","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HalimiPKKS15","ee":"http://arxiv.org/abs/1504.07713","url":"https://dblp.org/rec/journals/corr/HalimiPKKS15"}, "url":"URL#3677199" }, { "@score":"1", "@id":"3677217", "info":{"authors":{"author":[{"@pid":"160/9126","text":"Mrinal Haloi"},{"@pid":"39/1552","text":"Dinesh Babu Jayagopi"}]},"title":"A Robust Lane Detection and Departure Warning System.","venue":"CoRR","volume":"abs/1504.07590","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaloiJ15b","ee":"http://arxiv.org/abs/1504.07590","url":"https://dblp.org/rec/journals/corr/HaloiJ15b"}, "url":"URL#3677217" }, { "@score":"1", "@id":"3677230", "info":{"authors":{"author":[{"@pid":"128/3534","text":"Michael Hamann"},{"@pid":"18/9558","text":"Ben Strasser"}]},"title":"Graph Bisection with Pareto-Optimization.","venue":"CoRR","volume":"abs/1504.03812","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HamannS15","ee":"http://arxiv.org/abs/1504.03812","url":"https://dblp.org/rec/journals/corr/HamannS15"}, "url":"URL#3677230" }, { "@score":"1", "@id":"3677241", "info":{"authors":{"author":[{"@pid":"153/7521","text":"Alan J. Hamlet"},{"@pid":"20/6840","text":"Carl D. Crane III"}]},"title":"Joint Belief and Intent Prediction for Collision Avoidance in Autonomous Vehicles.","venue":"CoRR","volume":"abs/1504.00060","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HamletC15","ee":"http://arxiv.org/abs/1504.00060","url":"https://dblp.org/rec/journals/corr/HamletC15"}, "url":"URL#3677241" }, { "@score":"1", "@id":"3677256", "info":{"authors":{"author":{"@pid":"b/ABenHamza","text":"A. Ben Hamza"}},"title":"Spectral Graph Theoretic Analysis of Tsallis Entropy-based Dissimilarity Measure.","venue":"CoRR","volume":"abs/1504.01799","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hamza15","ee":"http://arxiv.org/abs/1504.01799","url":"https://dblp.org/rec/journals/corr/Hamza15"}, "url":"URL#3677256" }, { "@score":"1", "@id":"3677258", "info":{"authors":{"author":[{"@pid":"119/9917","text":"Qiaoni Han"},{"@pid":"46/999-6","text":"Bo Yang 0006"},{"@pid":"35/6761","text":"Cailian Chen"},{"@pid":"25/3029","text":"Xin-Ping Guan"}]},"title":"Backhaul-aware Joint User Association and Resource Allocation for Energy-constrained HetNets.","venue":"CoRR","volume":"abs/1504.03503","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Han0CG15","ee":"http://arxiv.org/abs/1504.03503","url":"https://dblp.org/rec/journals/corr/Han0CG15"}, "url":"URL#3677258" }, { "@score":"1", "@id":"3677285", "info":{"authors":{"author":[{"@pid":"87/7513-1","text":"Rui Han 0001"},{"@pid":"161/9910","text":"Shulin Zhan"},{"@pid":"162/0154","text":"Chenrong Shao"},{"@pid":"81/4816","text":"Junwei Wang"},{"@pid":"93/10294","text":"Jiangtao Xu"},{"@pid":"j/LizyKurianJohn","text":"Lizy K. John"},{"@pid":"w/LeiWang4","text":"Lei Wang 0004"},{"@pid":"12/2485","text":"Jianfeng Zhan"}]},"title":"BigDataBench-MT: A Benchmark Tool for Generating Realistic Mixed Data Center Workloads.","venue":"CoRR","volume":"abs/1504.02205","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HanZSWXJWZ15","ee":"http://arxiv.org/abs/1504.02205","url":"https://dblp.org/rec/journals/corr/HanZSWXJWZ15"}, "url":"URL#3677285" }, { "@score":"1", "@id":"3677309", "info":{"authors":{"author":[{"@pid":"129/1659","text":"Miika Hannula"},{"@pid":"71/6705","text":"Juha Kontinen"},{"@pid":"33/9507","text":"Jonni Virtema"},{"@pid":"v/HeribertVollmer","text":"Heribert Vollmer"}]},"title":"Complexity of Propositional Independence and Inclusion Logic.","venue":"CoRR","volume":"abs/1504.06135","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HannulaKVV15","ee":"http://arxiv.org/abs/1504.06135","url":"https://dblp.org/rec/journals/corr/HannulaKVV15"}, "url":"URL#3677309" }, { "@score":"1", "@id":"3677337", "info":{"authors":{"author":{"@pid":"143/7333","text":"Giannis Haralabopoulos"}},"title":"An Anonymous Social Network of Opinions.","venue":"CoRR","volume":"abs/1504.05430","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Haralabopoulos15","ee":"http://arxiv.org/abs/1504.05430","url":"https://dblp.org/rec/journals/corr/Haralabopoulos15"}, "url":"URL#3677337" }, { "@score":"1", "@id":"3677369", "info":{"authors":{"author":[{"@pid":"02/9232","text":"Sundar Harshavardhan"},{"@pid":"s/TVSreenivas","text":"Thippur V. Sreenivas"}]},"title":"Who Spoke What? A Latent Variable Framework for the Joint Decoding of Multiple Speakers and their Keywords.","venue":"CoRR","volume":"abs/1504.08021","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarshavardhanS15","ee":"http://arxiv.org/abs/1504.08021","url":"https://dblp.org/rec/journals/corr/HarshavardhanS15"}, "url":"URL#3677369" }, { "@score":"1", "@id":"3677377", "info":{"authors":{"author":[{"@pid":"89/7952","text":"Arnd Hartmanns"},{"@pid":"h/HolgerHermanns","text":"Holger Hermanns"}]},"title":"Explicit Model Checking of Very Large MDP using Partitioning and Secondary Storage.","venue":"CoRR","volume":"abs/1504.02861","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HartmannsH15","ee":"http://arxiv.org/abs/1504.02861","url":"https://dblp.org/rec/journals/corr/HartmannsH15"}, "url":"URL#3677377" }, { "@score":"1", "@id":"3677382", "info":{"authors":{"author":[{"@pid":"93/4141","text":"Nicholas J. A. Harvey"},{"@pid":"29/5942","text":"Jan Vondrák"}]},"title":"An Algorithmic Proof of the Lopsided Lovasz Local Lemma.","venue":"CoRR","volume":"abs/1504.02044","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HarveyV15","ee":"http://arxiv.org/abs/1504.02044","url":"https://dblp.org/rec/journals/corr/HarveyV15"}, "url":"URL#3677382" }, { "@score":"1", "@id":"3677397", "info":{"authors":{"author":[{"@pid":"143/0717","text":"Morteza Hashemi"},{"@pid":"50/8860","text":"Yuval Cassuto"},{"@pid":"t/AriTrachtenberg","text":"Ari Trachtenberg"}]},"title":"Fountain Codes with Nonuniform Selection Distributions through Feedback.","venue":"CoRR","volume":"abs/1504.01802","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HashemiCT15","ee":"http://arxiv.org/abs/1504.01802","url":"https://dblp.org/rec/journals/corr/HashemiCT15"}, "url":"URL#3677397" }, { "@score":"1", "@id":"3677419", "info":{"authors":{"author":[{"@pid":"161/9963","text":"Fadoua Hassen"},{"@pid":"20/2546","text":"Amel Grissa Touzi"}]},"title":"Intelligent Implementation Processor Design for Oracle Distributed Databases System.","venue":"CoRR","volume":"abs/1504.02957","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HassenG15","ee":"http://arxiv.org/abs/1504.02957","url":"https://dblp.org/rec/journals/corr/HassenG15"}, "url":"URL#3677419" }, { "@score":"1", "@id":"3677429", "info":{"authors":{"author":[{"@pid":"157/2717","text":"Robin Haunschild"},{"@pid":"09/5112","text":"Lutz Bornmann"},{"@pid":"18/5038","text":"Loet Leydesdorff"}]},"title":"Networks of reader and country status: An analysis of Mendeley reader statistics.","venue":"CoRR","volume":"abs/1504.07482","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HaunschildBL15","ee":"http://arxiv.org/abs/1504.07482","url":"https://dblp.org/rec/journals/corr/HaunschildBL15"}, "url":"URL#3677429" }, { "@score":"1", "@id":"3677435", "info":{"authors":{"author":[{"@pid":"03/9465","text":"Stefanie Haustein"},{"@pid":"27/6523","text":"Cassidy R. Sugimoto"},{"@pid":"02/3904","text":"Vincent Larivière"}]},"title":"Guest Editorial: Social media metrics in scholarly communication.","venue":"CoRR","volume":"abs/1504.01877","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HausteinSL15","ee":"http://arxiv.org/abs/1504.01877","url":"https://dblp.org/rec/journals/corr/HausteinSL15"}, "url":"URL#3677435" }, { "@score":"1", "@id":"3677436", "info":{"authors":{"author":[{"@pid":"161/9787","text":"Adrien Hauteville"},{"@pid":"53/7044","text":"Jean-Pierre Tillich"}]},"title":"New algorithms for decoding in the rank metric and an attack on the LRPC cryptosystem.","venue":"CoRR","volume":"abs/1504.05431","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HautevilleT15","ee":"http://arxiv.org/abs/1504.05431","url":"https://dblp.org/rec/journals/corr/HautevilleT15"}, "url":"URL#3677436" }, { "@score":"1", "@id":"3677442", "info":{"authors":{"author":[{"@pid":"14/1761","text":"Ishay Haviv"},{"@pid":"r/OdedRegev","text":"Oded Regev 0001"}]},"title":"The List-Decoding Size of Fourier-Sparse Boolean Functions.","venue":"CoRR","volume":"abs/1504.01649","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HavivR15","ee":"http://arxiv.org/abs/1504.01649","url":"https://dblp.org/rec/journals/corr/HavivR15"}, "url":"URL#3677442" }, { "@score":"1", "@id":"3677451", "info":{"authors":{"author":{"@pid":"44/1411","text":"Yukio Hayashi"}},"title":"Simple Derivation of the Lifetime and the Distribution of Faces for a Binary Subdivision Model.","venue":"CoRR","volume":"abs/1504.06922","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hayashi15a","ee":"http://arxiv.org/abs/1504.06922","url":"https://dblp.org/rec/journals/corr/Hayashi15a"}, "url":"URL#3677451" }, { "@score":"1", "@id":"3677454", "info":{"authors":{"author":[{"@pid":"84/1101","text":"Kohei Hayashi"},{"@pid":"90/4637","text":"Shin-ichi Maeda"},{"@pid":"07/494","text":"Ryohei Fujimaki"}]},"title":"Rebuilding Factorized Information Criterion: Asymptotically Accurate Marginal Likelihood.","venue":"CoRR","volume":"abs/1504.05665","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HayashiMF15","ee":"http://arxiv.org/abs/1504.05665","url":"https://dblp.org/rec/journals/corr/HayashiMF15"}, "url":"URL#3677454" }, { "@score":"1", "@id":"3677455", "info":{"authors":{"author":[{"@pid":"37/3488","text":"Masahito Hayashi"},{"@pid":"60/2327","text":"Vincent Yan Fu Tan"}]},"title":"Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures.","venue":"CoRR","volume":"abs/1504.02536","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HayashiT15","ee":"http://arxiv.org/abs/1504.02536","url":"https://dblp.org/rec/journals/corr/HayashiT15"}, "url":"URL#3677455" }, { "@score":"1", "@id":"3677461", "info":{"authors":{"author":[{"@pid":"72/739","text":"Elad Hazan"},{"@pid":"12/10044","text":"Tomer Koren"}]},"title":"The Computational Power of Optimization in Online Learning.","venue":"CoRR","volume":"abs/1504.02089","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HazanK15","ee":"http://arxiv.org/abs/1504.02089","url":"https://dblp.org/rec/journals/corr/HazanK15"}, "url":"URL#3677461" }, { "@score":"1", "@id":"3677472", "info":{"authors":{"author":{"@pid":"10/6942","text":"Q. He"}},"title":"Fast and Rigorous DC Solution in Finite Element Method for Integrated Circuit Analysis.","venue":"CoRR","volume":"abs/1504.06664","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/He15a","ee":"http://arxiv.org/abs/1504.06664","url":"https://dblp.org/rec/journals/corr/He15a"}, "url":"URL#3677472" }, { "@score":"1", "@id":"3677483", "info":{"authors":{"author":[{"@pid":"75/5705-4","text":"Jun He 0004"},{"@pid":"99/5219","text":"Guangming Lin"}]},"title":"Average Convergence Rate of Evolutionary Algorithms.","venue":"CoRR","volume":"abs/1504.08117","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeL15a","ee":"http://arxiv.org/abs/1504.08117","url":"https://dblp.org/rec/journals/corr/HeL15a"}, "url":"URL#3677483" }, { "@score":"1", "@id":"3677484", "info":{"authors":{"author":[{"@pid":"162/0132","text":"Qijun He"},{"@pid":"55/7254","text":"Matthew Macauley"}]},"title":"Stratification and enumeration of Boolean functions by canalizing depth.","venue":"CoRR","volume":"abs/1504.07591","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeM15","ee":"http://arxiv.org/abs/1504.07591","url":"https://dblp.org/rec/journals/corr/HeM15"}, "url":"URL#3677484" }, { "@score":"1", "@id":"3677498", "info":{"authors":{"author":[{"@pid":"18/813-8","text":"Hao He 0008"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"A Coalitional Game for Distributed Inference in Sensor Networks with Dependent Observations.","venue":"CoRR","volume":"abs/1504.03679","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeV15a","ee":"http://arxiv.org/abs/1504.03679","url":"https://dblp.org/rec/journals/corr/HeV15a"}, "url":"URL#3677498" }, { "@score":"1", "@id":"3677548", "info":{"authors":{"author":{"@pid":"78/6036","text":"Dirk Helbing"}},"title":"Societal, Economic, Ethical and Legal Challenges of the Digital Revolution: From Big Data to Deep Learning, Artificial Intelligence, and Manipulative Technologies.","venue":"CoRR","volume":"abs/1504.03751","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Helbing15","ee":"http://arxiv.org/abs/1504.03751","url":"https://dblp.org/rec/journals/corr/Helbing15"}, "url":"URL#3677548" }, { "@score":"1", "@id":"3677549", "info":{"authors":{"author":{"@pid":"78/6036","text":"Dirk Helbing"}},"title":"Responding to complexity in socio-economic systems: How to build a smart and resilient society?","venue":"CoRR","volume":"abs/1504.03750","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Helbing15a","ee":"http://arxiv.org/abs/1504.03750","url":"https://dblp.org/rec/journals/corr/Helbing15a"}, "url":"URL#3677549" }, { "@score":"1", "@id":"3677553", "info":{"authors":{"author":[{"@pid":"h/LauriHella","text":"Lauri Hella"},{"@pid":"26/285","text":"Antti Kuusisto"},{"@pid":"38/5700","text":"Arne Meier"},{"@pid":"v/HeribertVollmer","text":"Heribert Vollmer"}]},"title":"Satisfiability of Modal Inclusion Logic: Lax and Strict Semantics.","venue":"CoRR","volume":"abs/1504.06409","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HellaKMV15","ee":"http://arxiv.org/abs/1504.06409","url":"https://dblp.org/rec/journals/corr/HellaKMV15"}, "url":"URL#3677553" }, { "@score":"1", "@id":"3677554", "info":{"authors":{"author":[{"@pid":"h/LisaHellerstein","text":"Lisa Hellerstein"},{"@pid":"75/9827","text":"Devorah Kletenik"},{"@pid":"52/7559-1","text":"Patrick Lin 0001"}]},"title":"Discrete Stochastic Submodular Maximization: Adaptive vs. Non-Adaptive vs. Offline.","venue":"CoRR","volume":"abs/1504.02146","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HellersteinKL15","ee":"http://arxiv.org/abs/1504.02146","url":"https://dblp.org/rec/journals/corr/HellersteinKL15"}, "url":"URL#3677554" }, { "@score":"1", "@id":"3677586", "info":{"authors":{"author":[{"@pid":"h/MonikaRauchHenzinger","text":"Monika Henzinger"},{"@pid":"33/9134","text":"Sebastian Krinninger"},{"@pid":"61/2421","text":"Danupon Nanongkai"}]},"title":"An Almost-Tight Distributed Algorithm for Computing Single-Source Shortest Paths.","venue":"CoRR","volume":"abs/1504.07056","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HenzingerKN15","ee":"http://arxiv.org/abs/1504.07056","url":"https://dblp.org/rec/journals/corr/HenzingerKN15"}, "url":"URL#3677586" }, { "@score":"1", "@id":"3677587", "info":{"authors":{"author":[{"@pid":"h/MonikaRauchHenzinger","text":"Monika Henzinger"},{"@pid":"33/9134","text":"Sebastian Krinninger"},{"@pid":"61/2421","text":"Danupon Nanongkai"}]},"title":"Sublinear-Time Decremental Algorithms for Single-Source Reachability and Shortest Paths on Directed Graphs.","venue":"CoRR","volume":"abs/1504.07959","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HenzingerKN15a","ee":"http://arxiv.org/abs/1504.07959","url":"https://dblp.org/rec/journals/corr/HenzingerKN15a"}, "url":"URL#3677587" }, { "@score":"1", "@id":"3677593", "info":{"authors":{"author":[{"@pid":"86/9074","text":"Victor Heorhiadi"},{"@pid":"r/MichaelKReiter","text":"Michael K. Reiter"},{"@pid":"45/4044","text":"Vyas Sekar"}]},"title":"Accelerating the Development of Software-Defined Network Optimization Applications Using SOL.","venue":"CoRR","volume":"abs/1504.07704","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeorhiadiRS15","ee":"http://arxiv.org/abs/1504.07704","url":"https://dblp.org/rec/journals/corr/HeorhiadiRS15"}, "url":"URL#3677593" }, { "@score":"1", "@id":"3677603", "info":{"authors":{"author":[{"@pid":"65/484","text":"Ivo Herman"},{"@pid":"67/10315","text":"Dan Martinec"},{"@pid":"80/4832","text":"J. J. P. Veerman"}]},"title":"Transients of platoons with asymmetric and different Laplacians.","venue":"CoRR","volume":"abs/1504.06075","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HermanMV15","ee":"http://arxiv.org/abs/1504.06075","url":"https://dblp.org/rec/journals/corr/HermanMV15"}, "url":"URL#3677603" }, { "@score":"1", "@id":"3677635", "info":{"authors":{"author":[{"@pid":"43/5666","text":"Chris Heunen"},{"@pid":"161/9904","text":"Bert Lindenhovius"}]},"title":"Domains of commutative C*-subalgebras.","venue":"CoRR","volume":"abs/1504.02730","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeunenL15","ee":"http://arxiv.org/abs/1504.02730","url":"https://dblp.org/rec/journals/corr/HeunenL15"}, "url":"URL#3677635" }, { "@score":"1", "@id":"3677638", "info":{"authors":{"author":[{"@pid":"61/5392","text":"Babak Heydari"},{"@pid":"143/9811","text":"Mohsen Mosleh"},{"@pid":"36/962","text":"Kia Dalili"}]},"title":"Efficient Network Structures with Separable Heterogeneous Connection Costs.","venue":"CoRR","volume":"abs/1504.06634","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HeydariMD15","ee":"http://arxiv.org/abs/1504.06634","url":"https://dblp.org/rec/journals/corr/HeydariMD15"}, "url":"URL#3677638" }, { "@score":"1", "@id":"3677641", "info":{"authors":{"author":[{"@pid":"95/7278","text":"Le Van Hien"},{"@pid":"56/10766","text":"Hieu Trinh"}]},"title":"Exponential stability of time-delay systems via new weighted integral inequalities.","venue":"CoRR","volume":"abs/1504.06709","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HienT15","ee":"http://arxiv.org/abs/1504.06709","url":"https://dblp.org/rec/journals/corr/HienT15"}, "url":"URL#3677641" }, { "@score":"1", "@id":"3677642", "info":{"authors":{"author":[{"@pid":"86/9507","text":"Daniel Hienert"},{"@pid":"07/11142","text":"Wilko van Hoek"},{"@pid":"160/1761","text":"Alina Weber"},{"@pid":"51/1343","text":"Dagmar Kern"}]},"title":"WHOSE - A Tool for Whole-Session Analysis in IIR.","venue":"CoRR","volume":"abs/1504.06961","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HienertHWK15","ee":"http://arxiv.org/abs/1504.06961","url":"https://dblp.org/rec/journals/corr/HienertHWK15"}, "url":"URL#3677642" }, { "@score":"1", "@id":"3677643", "info":{"authors":{"author":[{"@pid":"86/9507","text":"Daniel Hienert"},{"@pid":"71/2258","text":"Dennis Wegener"},{"@pid":"57/11466","text":"Siegfried Schomisch"}]},"title":"Making sense of Open Data Statistics with Information from Wikipedia.","venue":"CoRR","volume":"abs/1504.06966","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HienertWS15","ee":"http://arxiv.org/abs/1504.06966","url":"https://dblp.org/rec/journals/corr/HienertWS15"}, "url":"URL#3677643" }, { "@score":"1", "@id":"3677644", "info":{"authors":{"author":[{"@pid":"86/9507","text":"Daniel Hienert"},{"@pid":"71/2258","text":"Dennis Wegener"},{"@pid":"57/11466","text":"Siegfried Schomisch"}]},"title":"Exploring semantically-related concepts from Wikipedia: the case of SeRE.","venue":"CoRR","volume":"abs/1504.07071","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HienertWS15a","ee":"http://arxiv.org/abs/1504.07071","url":"https://dblp.org/rec/journals/corr/HienertWS15a"}, "url":"URL#3677644" }, { "@score":"1", "@id":"3677647", "info":{"authors":{"author":[{"@pid":"116/0509","text":"Felix Hill"},{"@pid":"41/9736","text":"Kyunghyun Cho"},{"@pid":"14/6532","text":"Anna Korhonen"},{"@pid":"56/953","text":"Yoshua Bengio"}]},"title":"Learning to Understand Phrases by Embedding the Dictionary.","venue":"CoRR","volume":"abs/1504.00548","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HillCKB15","ee":"http://arxiv.org/abs/1504.00548","url":"https://dblp.org/rec/journals/corr/HillCKB15"}, "url":"URL#3677647" }, { "@score":"1", "@id":"3677664", "info":{"authors":{"author":[{"@pid":"82/400-1","text":"Hiroshi Hirai 0001"},{"@pid":"144/7775","text":"Yuni Iwamasa"}]},"title":"On k-Submodular Relaxation.","venue":"CoRR","volume":"abs/1504.07830","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HiraiI15","ee":"http://arxiv.org/abs/1504.07830","url":"https://dblp.org/rec/journals/corr/HiraiI15"}, "url":"URL#3677664" }, { "@score":"1", "@id":"3677668", "info":{"authors":{"author":[{"@pid":"23/2141","text":"Sachio Hirokawa"},{"@pid":"25/5307","text":"Eisuke Ito"}]},"title":"Power Law and Entropy.","venue":"CoRR","volume":"abs/1504.06543","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HirokawaI15","ee":"http://arxiv.org/abs/1504.06543","url":"https://dblp.org/rec/journals/corr/HirokawaI15"}, "url":"URL#3677668" }, { "@score":"1", "@id":"3677673", "info":{"authors":{"author":[{"@pid":"93/9058","text":"Masato Hisakado"},{"@pid":"67/9061","text":"Shintaro Mori"}]},"title":"Information cascade on networks.","venue":"CoRR","volume":"abs/1504.00458","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HisakadoM15","ee":"http://arxiv.org/abs/1504.00458","url":"https://dblp.org/rec/journals/corr/HisakadoM15"}, "url":"URL#3677673" }, { "@score":"1", "@id":"3677689", "info":{"authors":{"author":{"@pid":"06/4513","text":"Ronald Hochreiter"}},"title":"Computing trading strategies based on financial sentiment data using evolutionary optimization.","venue":"CoRR","volume":"abs/1504.02972","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hochreiter15","ee":"http://arxiv.org/abs/1504.02972","url":"https://dblp.org/rec/journals/corr/Hochreiter15"}, "url":"URL#3677689" }, { "@score":"1", "@id":"3677715", "info":{"authors":{"author":[{"@pid":"65/9529","text":"Benjamin Holland"},{"@pid":"145/3977","text":"Tom Deering"},{"@pid":"k/SureshCKothari","text":"Suresh C. Kothari"},{"@pid":"145/4005","text":"Jon Mathews"},{"@pid":"161/9811","text":"Nikhil Ranade"}]},"title":"Security Toolbox for Detecting Novel and Sophisticated Android Malware.","venue":"CoRR","volume":"abs/1504.01693","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HollandDKMR15","ee":"http://arxiv.org/abs/1504.01693","url":"https://dblp.org/rec/journals/corr/HollandDKMR15"}, "url":"URL#3677715" }, { "@score":"1", "@id":"3677718", "info":{"authors":{"author":[{"@pid":"86/9672","text":"Simon J. Hollis"},{"@pid":"146/0698","text":"Steve Kerrison"}]},"title":"Overview of Swallow - A Scalable 480-core System for Investigating the Performance and Energy Efficiency of Many-core Applications and Operating Systems.","venue":"CoRR","volume":"abs/1504.06357","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HollisK15","ee":"http://arxiv.org/abs/1504.06357","url":"https://dblp.org/rec/journals/corr/HollisK15"}, "url":"URL#3677718" }, { "@score":"1", "@id":"3677729", "info":{"authors":{"author":[{"@pid":"h/StepanHolub","text":"Stepan Holub"},{"@pid":"117/1694","text":"Mike Müller"}]},"title":"Binary words with the fewest unbordered conjugates.","venue":"CoRR","volume":"abs/1504.02222","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HolubM15","ee":"http://arxiv.org/abs/1504.02222","url":"https://dblp.org/rec/journals/corr/HolubM15"}, "url":"URL#3677729" }, { "@score":"1", "@id":"3677747", "info":{"authors":{"author":[{"@pid":"74/3319","text":"Neil P. Chue Hong"},{"@pid":"29/5052","text":"Tom Crick"},{"@pid":"30/3076","text":"Ian P. Gent"},{"@pid":"42/7865","text":"Lars Kotthoff"},{"@pid":"80/1670","text":"Kenji Takeda"}]},"title":"Top Tips to Make Your Research Irreproducible.","venue":"CoRR","volume":"abs/1504.00062","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HongCGKT15","ee":"http://arxiv.org/abs/1504.00062","url":"https://dblp.org/rec/journals/corr/HongCGKT15"}, "url":"URL#3677747" }, { "@score":"1", "@id":"3677751", "info":{"authors":{"author":[{"@pid":"03/3341","text":"Yao-Win Peter Hong"},{"@pid":"27/8659","text":"Wei-Chiang Li"},{"@pid":"67/4030","text":"Tsung-Hui Chang"},{"@pid":"53/5898","text":"Chia-Han Lee"}]},"title":"Coordinated Multicasting with Opportunistic User Selection in Multicell Wireless Systems.","venue":"CoRR","volume":"abs/1504.04080","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HongLCL15","ee":"http://arxiv.org/abs/1504.04080","url":"https://dblp.org/rec/journals/corr/HongLCL15"}, "url":"URL#3677751" }, { "@score":"1", "@id":"3677765", "info":{"authors":{"author":[{"@pid":"159/8268","text":"Pim van der Hoorn"},{"@pid":"30/2609","text":"Nelly Litvak"}]},"title":"Phase transitions for scaling of structural correlations in directed networks.","venue":"CoRR","volume":"abs/1504.01535","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoornL15","ee":"http://arxiv.org/abs/1504.01535","url":"https://dblp.org/rec/journals/corr/HoornL15"}, "url":"URL#3677765" }, { "@score":"1", "@id":"3677772", "info":{"authors":{"author":[{"@pid":"20/11142","text":"Victoria Horan"},{"@pid":"162/0169","text":"Steve Adachi"},{"@pid":"16/7787","text":"Stanley Bak"}]},"title":"A Comparison of Approaches for Solving Hard Graph-Theoretic Problems.","venue":"CoRR","volume":"abs/1504.08011","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoranAB15","ee":"http://arxiv.org/abs/1504.08011","url":"https://dblp.org/rec/journals/corr/HoranAB15"}, "url":"URL#3677772" }, { "@score":"1", "@id":"3677776", "info":{"authors":{"author":[{"@pid":"90/8133","text":"Yutaka Hori"},{"@pid":"135/6335","text":"Hiroki Miyazako"},{"@pid":"161/9941","text":"Soichiro Kumagai"},{"@pid":"39/5078","text":"Shinji Hara"}]},"title":"Coordinated Spatial Pattern Formation in Biomolecular Communication Networks.","venue":"CoRR","volume":"abs/1504.06045","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HoriMKH15","ee":"http://arxiv.org/abs/1504.06045","url":"https://dblp.org/rec/journals/corr/HoriMKH15"}, "url":"URL#3677776" }, { "@score":"1", "@id":"3677781", "info":{"authors":{"author":[{"@pid":"138/2467","text":"Alex Horn"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"}]},"title":"On partial order semantics for SAT/SMT-based symbolic encodings of weak memory concurrency.","venue":"CoRR","volume":"abs/1504.00037","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HornK15","ee":"http://arxiv.org/abs/1504.00037","url":"https://dblp.org/rec/journals/corr/HornK15"}, "url":"URL#3677781" }, { "@score":"1", "@id":"3677782", "info":{"authors":{"author":[{"@pid":"138/2467","text":"Alex Horn"},{"@pid":"k/DanielKroening","text":"Daniel Kroening"}]},"title":"Faster linearizability checking via $P$-compositionality.","venue":"CoRR","volume":"abs/1504.00204","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HornK15a","ee":"http://arxiv.org/abs/1504.00204","url":"https://dblp.org/rec/journals/corr/HornK15a"}, "url":"URL#3677782" }, { "@score":"1", "@id":"3677801", "info":{"authors":{"author":[{"@pid":"132/8022","text":"M. M. Aftab Hossain"},{"@pid":"j/RikuJantti","text":"Riku Jäntti"},{"@pid":"80/67","text":"Cicek Cavdar"}]},"title":"Energy saving market for mobile operators.","venue":"CoRR","volume":"abs/1504.01526","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HossainJC15","ee":"http://arxiv.org/abs/1504.01526","url":"https://dblp.org/rec/journals/corr/HossainJC15"}, "url":"URL#3677801" }, { "@score":"1", "@id":"3677824", "info":{"authors":{"author":[{"@pid":"161/9892","text":"Le Hou"},{"@pid":"s/DimitrisSamaras","text":"Dimitris Samaras"},{"@pid":"26/6088","text":"Tahsin M. Kurç"},{"@pid":"38/4304-2","text":"Yi Gao 0002"},{"@pid":"98/1944","text":"James E. Davis"},{"@pid":"s/JoelHSaltz","text":"Joel H. Saltz"}]},"title":"Efficient Multiple Instance Convolutional Neural Networks for Gigapixel Resolution Image Classification.","venue":"CoRR","volume":"abs/1504.07947","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HouSKGDS15","ee":"http://arxiv.org/abs/1504.07947","url":"https://dblp.org/rec/journals/corr/HouSKGDS15"}, "url":"URL#3677824" }, { "@score":"1", "@id":"3677825", "info":{"authors":{"author":[{"@pid":"144/2709","text":"Yi Hou"},{"@pid":"24/6914-13","text":"Hong Zhang 0013"},{"@pid":"50/10340","text":"Shilin Zhou"}]},"title":"Convolutional Neural Network-Based Image Representation for Visual Loop Closure Detection.","venue":"CoRR","volume":"abs/1504.05241","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HouZZ15","ee":"http://arxiv.org/abs/1504.05241","url":"https://dblp.org/rec/journals/corr/HouZZ15"}, "url":"URL#3677825" }, { "@score":"1", "@id":"3677848", "info":{"authors":{"author":[{"@pid":"47/3024","text":"Min-Hsiu Hsieh"},{"@pid":"83/387","text":"Shun Watanabe"}]},"title":"Fully Quantum Source Compression with a Quantum Helper.","venue":"CoRR","volume":"abs/1504.05227","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HsiehW15a","ee":"http://arxiv.org/abs/1504.05227","url":"https://dblp.org/rec/journals/corr/HsiehW15a"}, "url":"URL#3677848" }, { "@score":"1", "@id":"3677850", "info":{"authors":{"author":[{"@pid":"14/2770","text":"Cho-Jui Hsieh"},{"@pid":"97/1729","text":"Hsiang-Fu Yu"},{"@pid":"d/InderjitSDhillon","text":"Inderjit S. Dhillon"}]},"title":"PASSCoDe: Parallel ASynchronous Stochastic dual Co-ordinate Descent.","venue":"CoRR","volume":"abs/1504.01365","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HsiehYD15","ee":"http://arxiv.org/abs/1504.01365","url":"https://dblp.org/rec/journals/corr/HsiehYD15"}, "url":"URL#3677850" }, { "@score":"1", "@id":"3677892", "info":{"authors":{"author":[{"@pid":"98/7676","text":"Guosheng Hu"},{"@pid":"150/4258","text":"Yongxin Yang"},{"@pid":"60/1827","text":"Dong Yi"},{"@pid":"k/JosefKittler","text":"Josef Kittler"},{"@pid":"19/5515","text":"William J. Christmas"},{"@pid":"l/StanZLi","text":"Stan Z. Li"},{"@pid":"32/3545","text":"Timothy M. Hospedales"}]},"title":"When Face Recognition Meets with Deep Learning: an Evaluation of Convolutional Neural Networks for Face Recognition.","venue":"CoRR","volume":"abs/1504.02351","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuYYKCLH15","ee":"http://arxiv.org/abs/1504.02351","url":"https://dblp.org/rec/journals/corr/HuYYKCLH15"}, "url":"URL#3677892" }, { "@score":"1", "@id":"3677893", "info":{"authors":{"author":[{"@pid":"161/6290","text":"Chuangqiang Hu"},{"@pid":"32/1790","text":"Chang-An Zhao"}]},"title":"Multi-point Codes from Generalized Hermitian Curves.","venue":"CoRR","volume":"abs/1504.04171","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuZ15","ee":"http://arxiv.org/abs/1504.04171","url":"https://dblp.org/rec/journals/corr/HuZ15"}, "url":"URL#3677893" }, { "@score":"1", "@id":"3677897", "info":{"authors":{"author":[{"@pid":"95/7076-1","text":"Wenbo Hu 0001"},{"@pid":"50/2644-1","text":"Jun Zhu 0001"},{"@pid":"36/2259-10","text":"Bo Zhang 0010"}]},"title":"Stochastic Subgradient MCMC Methods.","venue":"CoRR","volume":"abs/1504.07107","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuZZ15","ee":"http://arxiv.org/abs/1504.07107","url":"https://dblp.org/rec/journals/corr/HuZZ15"}, "url":"URL#3677897" }, { "@score":"1", "@id":"3677902", "info":{"authors":{"author":{"@pid":"15/8037","text":"Sangxia Huang"}},"title":"$2{(\\log N){1/4-o(1)}}$ Hardness for Hypergraph Coloring.","venue":"CoRR","volume":"abs/1504.03923","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Huang15","ee":"http://arxiv.org/abs/1504.03923","url":"https://dblp.org/rec/journals/corr/Huang15"}, "url":"URL#3677902" }, { "@score":"1", "@id":"3677918", "info":{"authors":{"author":[{"@pid":"33/11192","text":"Hongzhao Huang"},{"@pid":"81/5380","text":"Larry P. Heck"},{"@pid":"61/2408","text":"Heng Ji"}]},"title":"Leveraging Deep Neural Networks and Knowledge Graphs for Entity Disambiguation.","venue":"CoRR","volume":"abs/1504.07678","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangHJ15","ee":"http://arxiv.org/abs/1504.07678","url":"https://dblp.org/rec/journals/corr/HuangHJ15"}, "url":"URL#3677918" }, { "@score":"1", "@id":"3677922", "info":{"authors":{"author":[{"@pid":"73/11459","text":"Wei-Jie Huang"},{"@pid":"23/2735","text":"Chao-Lin Liu"}]},"title":"Exploring Lexical, Syntactic, and Semantic Features for Chinese Textual Entailment in NTCIR RITE Evaluation Tasks.","venue":"CoRR","volume":"abs/1504.02150","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangL15","ee":"http://arxiv.org/abs/1504.02150","url":"https://dblp.org/rec/journals/corr/HuangL15"}, "url":"URL#3677922" }, { "@score":"1", "@id":"3677924", "info":{"authors":{"author":[{"@pid":"35/1495","text":"Wentao Huang"},{"@pid":"80/2567","text":"Michael Langberg"},{"@pid":"39/4721","text":"Jörg Kliewer"}]},"title":"Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability.","venue":"CoRR","volume":"abs/1504.04930","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangLK15","ee":"http://arxiv.org/abs/1504.04930","url":"https://dblp.org/rec/journals/corr/HuangLK15"}, "url":"URL#3677924" }, { "@score":"1", "@id":"3677931", "info":{"authors":{"author":[{"@pid":"129/2881","text":"Kechao Huang"},{"@pid":"35/573-1","text":"Xiao Ma 0001"}]},"title":"Performance Analysis of Block Markov Superposition Transmission of Short Codes.","venue":"CoRR","volume":"abs/1504.02978","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangM15","ee":"http://arxiv.org/abs/1504.02978","url":"https://dblp.org/rec/journals/corr/HuangM15"}, "url":"URL#3677931" }, { "@score":"1", "@id":"3677932", "info":{"authors":{"author":[{"@pid":"79/7077","text":"Longbo Huang"},{"@pid":"m/EytanModiano","text":"Eytan H. Modiano"}]},"title":"Optimizing Age-of-Information in a Multi-class Queueing System.","venue":"CoRR","volume":"abs/1504.05103","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangM15a","ee":"http://arxiv.org/abs/1504.05103","url":"https://dblp.org/rec/journals/corr/HuangM15a"}, "url":"URL#3677932" }, { "@score":"1", "@id":"3677943", "info":{"authors":{"author":[{"@pid":"25/692-1","text":"Xiao Huang 0001"},{"@pid":"122/2942","text":"Salim El Rouayheb"}]},"title":"Index Coding and Network Coding via Rank Minimization.","venue":"CoRR","volume":"abs/1504.06844","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangR15","ee":"http://arxiv.org/abs/1504.06844","url":"https://dblp.org/rec/journals/corr/HuangR15"}, "url":"URL#3677943" }, { "@score":"1", "@id":"3677961", "info":{"authors":{"author":[{"@pid":"81/6685-12","text":"Wei Huang 0012"},{"@pid":"140/0795","text":"Sinong Wang"},{"@pid":"26/1839","text":"Lianghui Ding"},{"@pid":"22/4613-6","text":"Feng Yang 0006"},{"@pid":"46/3359-1","text":"Wenjun Zhang 0001"}]},"title":"The Performance Analysis of Coded Cache in Wireless Fading Channel.","venue":"CoRR","volume":"abs/1504.01452","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuangWDY015","ee":"http://arxiv.org/abs/1504.01452","url":"https://dblp.org/rec/journals/corr/HuangWDY015"}, "url":"URL#3677961" }, { "@score":"1", "@id":"3678009", "info":{"authors":{"author":[{"@pid":"39/3508","text":"Paul Hunter"},{"@pid":"135/6266","text":"Guillermo A. Pérez 0001"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Reactive Synthesis Without Regret.","venue":"CoRR","volume":"abs/1504.01708","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HunterPR15","ee":"http://arxiv.org/abs/1504.01708","url":"https://dblp.org/rec/journals/corr/HunterPR15"}, "url":"URL#3678009" }, { "@score":"1", "@id":"3678010", "info":{"authors":{"author":[{"@pid":"39/3508","text":"Paul Hunter"},{"@pid":"135/6266","text":"Guillermo A. Pérez 0001"},{"@pid":"05/4174","text":"Jean-François Raskin"}]},"title":"Looking at Mean-Payoff through Foggy Windows.","venue":"CoRR","volume":"abs/1504.02947","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HunterPR15a","ee":"http://arxiv.org/abs/1504.02947","url":"https://dblp.org/rec/journals/corr/HunterPR15a"}, "url":"URL#3678010" }, { "@score":"1", "@id":"3678014", "info":{"authors":{"author":[{"@pid":"09/2179","text":"Neal E. Hurlburt"},{"@pid":"162/0068","text":"Steve Jaffey"}]},"title":"A spectral optical flow method for determining velocities from digital imagery.","venue":"CoRR","volume":"abs/1504.04660","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HurlburtJ15","ee":"http://arxiv.org/abs/1504.04660","url":"https://dblp.org/rec/journals/corr/HurlburtJ15"}, "url":"URL#3678014" }, { "@score":"1", "@id":"3678016", "info":{"authors":{"author":{"@pid":"161/9836","text":"Joan Hurtado"}},"title":"Automated System for Improving RSS Feeds Data Quality.","venue":"CoRR","volume":"abs/1504.01433","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Hurtado15","ee":"http://arxiv.org/abs/1504.01433","url":"https://dblp.org/rec/journals/corr/Hurtado15"}, "url":"URL#3678016" }, { "@score":"1", "@id":"3678019", "info":{"authors":{"author":[{"@pid":"68/7630","text":"Rasheed Hussain"},{"@pid":"33/6749-1","text":"Donghyun Kim 0001"},{"@pid":"22/4022","text":"Michele Nogueira"},{"@pid":"120/9411","text":"Junggab Son"},{"@pid":"17/11344","text":"Alade O. Tokuta"},{"@pid":"03/865","text":"Heekuck Oh"}]},"title":"PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.","venue":"CoRR","volume":"abs/1504.05276","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HussainKNSTO15","ee":"http://arxiv.org/abs/1504.05276","url":"https://dblp.org/rec/journals/corr/HussainKNSTO15"}, "url":"URL#3678019" }, { "@score":"1", "@id":"3678025", "info":{"authors":{"author":[{"@pid":"117/4058","text":"Brody Huval"},{"@pid":"12/5838","text":"Tao Wang"},{"@pid":"03/9969","text":"Sameep Tandon"},{"@pid":"161/9966","text":"Jeff Kiske"},{"@pid":"162/0144","text":"Will Song"},{"@pid":"162/0124","text":"Joel Pazhayampallil"},{"@pid":"54/4495","text":"Mykhaylo Andriluka"},{"@pid":"161/3744","text":"Pranav Rajpurkar"},{"@pid":"162/0225","text":"Toki Migimatsu"},{"@pid":"162/0088","text":"Royce Cheng-Yue"},{"@pid":"27/1360","text":"Fernando A. Mujica"},{"@pid":"60/5515-2","text":"Adam Coates 0002"},{"@pid":"n/AndrewYNg","text":"Andrew Y. Ng"}]},"title":"An Empirical Evaluation of Deep Learning on Highway Driving.","venue":"CoRR","volume":"abs/1504.01716","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/HuvalWTKSPARMCM15","ee":"http://arxiv.org/abs/1504.01716","url":"https://dblp.org/rec/journals/corr/HuvalWTKSPARMCM15"}, "url":"URL#3678025" }, { "@score":"1", "@id":"3678050", "info":{"authors":{"author":[{"@pid":"162/0175","text":"Mazlinda Ibrahim"},{"@pid":"47/6529-2","text":"Ke Chen 0002"},{"@pid":"90/8115","text":"Carlos Brito-Loeza"}]},"title":"A novel variational model for image registration using Gaussian curvature.","venue":"CoRR","volume":"abs/1504.07643","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ibrahim0B15","ee":"http://arxiv.org/abs/1504.07643","url":"https://dblp.org/rec/journals/corr/Ibrahim0B15"}, "url":"URL#3678050" }, { "@score":"1", "@id":"3678065", "info":{"authors":{"author":[{"@pid":"90/9091","text":"Dai Ikarashi"},{"@pid":"79/8627","text":"Ryo Kikuchi"},{"@pid":"57/5802","text":"Koji Chida"},{"@pid":"78/6039","text":"Katsumi Takahashi"}]},"title":"k-anonymous Microdata Release via Post Randomisation Method.","venue":"CoRR","volume":"abs/1504.05353","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IkarashiKCT15","ee":"http://arxiv.org/abs/1504.05353","url":"https://dblp.org/rec/journals/corr/IkarashiKCT15"}, "url":"URL#3678065" }, { "@score":"1", "@id":"3678083", "info":{"authors":{"author":[{"@pid":"115/9099","text":"Hiroto Imachi"},{"@pid":"118/9458","text":"Takeo Hoshi"}]},"title":"Hybrid Numerical Solvers for Massively Parallel Eigenvalue Computation and Their Benchmark with Electronic Structure Calculations.","venue":"CoRR","volume":"abs/1504.06443","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ImachiH15","ee":"http://arxiv.org/abs/1504.06443","url":"https://dblp.org/rec/journals/corr/ImachiH15"}, "url":"URL#3678083" }, { "@score":"1", "@id":"3678127", "info":{"authors":{"author":[{"@pid":"73/4468","text":"Md. Rafiqul Islam"},{"@pid":"03/6801","text":"Md. Ahsan Habib"}]},"title":"A Data Mining Approach to Predict Prospective Business Sectors for Lending in Retail Banking Using Decision Tree.","venue":"CoRR","volume":"abs/1504.02018","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IslamH15","ee":"http://arxiv.org/abs/1504.02018","url":"https://dblp.org/rec/journals/corr/IslamH15"}, "url":"URL#3678127" }, { "@score":"1", "@id":"3678138", "info":{"authors":{"author":[{"@pid":"56/11249","text":"Hassan Ismkhan"},{"@pid":"63/426","text":"Kamran Zamanifar"}]},"title":"Study of Some Recent Crossovers Effects on Speed and Accuracy of Genetic Algorithm, Using Symmetric Travelling Salesman Problem.","venue":"CoRR","volume":"abs/1504.02590","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IsmkhanZ15","ee":"http://arxiv.org/abs/1504.02590","url":"https://dblp.org/rec/journals/corr/IsmkhanZ15"}, "url":"URL#3678138" }, { "@score":"1", "@id":"3678142", "info":{"authors":{"author":[{"@pid":"162/0232","text":"Mohamed A. Itani"},{"@pid":"94/181","text":"Ulf D. Schiller"},{"@pid":"162/0054","text":"Sebastian Schmieschek"},{"@pid":"00/4403","text":"James Hetherington"},{"@pid":"83/3964","text":"Miguel O. Bernabeu"},{"@pid":"161/9886","text":"Hoskote Chandrashekar"},{"@pid":"161/9900","text":"Fergus Robertson"},{"@pid":"35/3081","text":"Peter V. Coveney"},{"@pid":"49/2135","text":"Derek Groen"}]},"title":"An automated multiscale ensemble simulation approach for vascular blood flow.","venue":"CoRR","volume":"abs/1504.07795","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ItaniSSHBCRCG15","ee":"http://arxiv.org/abs/1504.07795","url":"https://dblp.org/rec/journals/corr/ItaniSSHBCRCG15"}, "url":"URL#3678142" }, { "@score":"1", "@id":"3678145", "info":{"authors":{"author":{"@pid":"46/3205","text":"Hiro Ito"}},"title":"Every property is testable on a natural class of scale-free multigraphs.","venue":"CoRR","volume":"abs/1504.00766","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Ito15","ee":"http://arxiv.org/abs/1504.00766","url":"https://dblp.org/rec/journals/corr/Ito15"}, "url":"URL#3678145" }, { "@score":"1", "@id":"3678147", "info":{"authors":{"author":[{"@pid":"155/0678","text":"Kosuke Ito"},{"@pid":"96/311","text":"Wataru Kumagai"},{"@pid":"37/3488","text":"Masahito Hayashi"}]},"title":"Asymptotic Compatibility between LOCC Conversion and Recovery.","venue":"CoRR","volume":"abs/1504.02967","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ItoKH15","ee":"http://arxiv.org/abs/1504.02967","url":"https://dblp.org/rec/journals/corr/ItoKH15"}, "url":"URL#3678147" }, { "@score":"1", "@id":"3678148", "info":{"authors":{"author":[{"@pid":"46/3205","text":"Hiro Ito"},{"@pid":"77/8432","text":"Takahiro Ueda"}]},"title":"How to solve the cake-cutting problem in sublinear time.","venue":"CoRR","volume":"abs/1504.00774","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ItoU15","ee":"http://arxiv.org/abs/1504.00774","url":"https://dblp.org/rec/journals/corr/ItoU15"}, "url":"URL#3678148" }, { "@score":"1", "@id":"3678159", "info":{"authors":{"author":[{"@pid":"207/5385","text":"Vladimir K. Ivanov"},{"@pid":"324/2939","text":"Pavel I. Meskin"}]},"title":"Genetic algorithm implementation for effective document subject search.","venue":"CoRR","volume":"abs/1504.04216","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IvanovM15","ee":"http://arxiv.org/abs/1504.04216","url":"https://dblp.org/rec/journals/corr/IvanovM15"}, "url":"URL#3678159" }, { "@score":"1", "@id":"3678160", "info":{"authors":{"author":[{"@pid":"207/5385","text":"Vladimir K. Ivanov"},{"@pid":"158/3156","text":"Boris V. Palyukh"}]},"title":"Study the effectiveness of genetic algorithm for documentary subject search.","venue":"CoRR","volume":"abs/1504.00305","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IvanovP15","ee":"http://arxiv.org/abs/1504.00305","url":"https://dblp.org/rec/journals/corr/IvanovP15"}, "url":"URL#3678160" }, { "@score":"1", "@id":"3678161", "info":{"authors":{"author":[{"@pid":"61/857","text":"Mikhail Ivanov"},{"@pid":"50/3930","text":"Petar Popovski"},{"@pid":"56/5920","text":"Fredrik Brannstrom"},{"@pid":"95/3707","text":"Alexandre Graell i Amat"},{"@pid":"84/6001","text":"Cedomir Stefanovic"}]},"title":"Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA.","venue":"CoRR","volume":"abs/1504.04465","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IvanovPBAS15","ee":"http://arxiv.org/abs/1504.04465","url":"https://dblp.org/rec/journals/corr/IvanovPBAS15"}, "url":"URL#3678161" }, { "@score":"1", "@id":"3678162", "info":{"authors":{"author":[{"@pid":"207/5385","text":"Vladimir K. Ivanov"},{"@pid":"158/3156","text":"Boris V. Palyukh"},{"@pid":"158/3138","text":"Alexander N. Sotnikov"}]},"title":"Approaches to the Intelligent Subject Search.","venue":"CoRR","volume":"abs/1504.02362","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/IvanovPS15","ee":"http://arxiv.org/abs/1504.02362","url":"https://dblp.org/rec/journals/corr/IvanovPS15"}, "url":"URL#3678162" }, { "@score":"1", "@id":"3678190", "info":{"authors":{"author":[{"@pid":"16/10649","text":"Florian Jacob"},{"@pid":"88/6542","text":"Reinhold Haeb-Umbach"}]},"title":"Absolute Geometry Calibration of Distributed Microphone Arrays in an Audio-Visual Sensor Network.","venue":"CoRR","volume":"abs/1504.03128","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JacobH15","ee":"http://arxiv.org/abs/1504.03128","url":"https://dblp.org/rec/journals/corr/JacobH15"}, "url":"URL#3678190" }, { "@score":"1", "@id":"3678195", "info":{"authors":{"author":[{"@pid":"162/0228","text":"Sven Jacobsson"},{"@pid":"12/3405","text":"Giuseppe Durisi"},{"@pid":"77/6971","text":"Mikael Coldrey"},{"@pid":"28/10290","text":"Ulf Gustavsson"},{"@pid":"51/3407","text":"Christoph Studer"}]},"title":"One-Bit Massive MIMO: Channel Estimation and High-Order Modulations.","venue":"CoRR","volume":"abs/1504.04540","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JacobssonDCGS15","ee":"http://arxiv.org/abs/1504.04540","url":"https://dblp.org/rec/journals/corr/JacobssonDCGS15"}, "url":"URL#3678195" }, { "@score":"1", "@id":"3678197", "info":{"authors":{"author":[{"@pid":"17/7785","text":"Mathias Jacquelin"},{"@pid":"00/3361-1","text":"Lin Lin 0001"},{"@pid":"63/9232","text":"Nathan Wichmann"},{"@pid":"00/5867-1","text":"Chao Yang 0001"}]},"title":"Enhancing the scalability and load balancing of the parallel selected inversion algorithm via tree-based asynchronous communication.","venue":"CoRR","volume":"abs/1504.04714","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JacquelinLWY15","ee":"http://arxiv.org/abs/1504.04714","url":"https://dblp.org/rec/journals/corr/JacquelinLWY15"}, "url":"URL#3678197" }, { "@score":"1", "@id":"3678198", "info":{"authors":{"author":{"@pid":"01/188","text":"Laurent Jacques"}},"title":"Small width, low distortions: quasi-isometric embeddings with quantized sub-Gaussian random projections.","venue":"CoRR","volume":"abs/1504.06170","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jacques15","ee":"http://arxiv.org/abs/1504.06170","url":"https://dblp.org/rec/journals/corr/Jacques15"}, "url":"URL#3678198" }, { "@score":"1", "@id":"3678203", "info":{"authors":{"author":[{"@pid":"120/8500","text":"Aaron Jaech"},{"@pid":"85/2189","text":"Mari Ostendorf"}]},"title":"Leveraging Twitter for Low-Resource Conversational Speech Language Modeling.","venue":"CoRR","volume":"abs/1504.02490","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JaechO15","ee":"http://arxiv.org/abs/1504.02490","url":"https://dblp.org/rec/journals/corr/JaechO15"}, "url":"URL#3678203" }, { "@score":"1", "@id":"3678224", "info":{"authors":{"author":[{"@pid":"j/AnilKJain","text":"Anil K. Jain 0001"},{"@pid":"118/1516","text":"Sunpreet S. Arora"},{"@pid":"156/9578","text":"Lacey Best-Rowden"},{"@pid":"93/555-1","text":"Kai Cao 0001"},{"@pid":"162/0011","text":"Prem Sewak Sudhish"},{"@pid":"162/0077","text":"Anjoo Bhatnagar"}]},"title":"Biometrics for Child Vaccination and Welfare: Persistence of Fingerprint Recognition for Infants and Toddlers.","venue":"CoRR","volume":"abs/1504.04651","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JainAB0SB15","ee":"http://arxiv.org/abs/1504.04651","url":"https://dblp.org/rec/journals/corr/JainAB0SB15"}, "url":"URL#3678224" }, { "@score":"1", "@id":"3678230", "info":{"authors":{"author":[{"@pid":"117/4349","text":"Ashesh Jain"},{"@pid":"41/7536","text":"Hema Swetha Koppula"},{"@pid":"161/9955","text":"Bharad Raghavan"},{"@pid":"82/6189","text":"Ashutosh Saxena"}]},"title":"Know Before You Do: Anticipating Maneuvers via Learning Temporal Driving Models.","venue":"CoRR","volume":"abs/1504.02789","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JainKRS15","ee":"http://arxiv.org/abs/1504.02789","url":"https://dblp.org/rec/journals/corr/JainKRS15"}, "url":"URL#3678230" }, { "@score":"1", "@id":"3678242", "info":{"authors":{"author":[{"@pid":"67/7118","text":"Dusan Jakovetic"},{"@pid":"96/8129","text":"Dragana Bajovic"},{"@pid":"69/6388","text":"Natasa Krejic"},{"@pid":"155/8224","text":"Natasa Krklec Jerinkic"}]},"title":"Distributed Gradient Methods with Variable Number of Working Nodes.","venue":"CoRR","volume":"abs/1504.04049","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JakoveticBKK15","ee":"http://arxiv.org/abs/1504.04049","url":"https://dblp.org/rec/journals/corr/JakoveticBKK15"}, "url":"URL#3678242" }, { "@score":"1", "@id":"3678276", "info":{"authors":{"author":[{"@pid":"j/KlausJansen","text":"Klaus Jansen"},{"@pid":"161/9770","text":"Stefan Erich Julius Kraft"}]},"title":"A Faster FPTAS for the Unbounded Knapsack Problem.","venue":"CoRR","volume":"abs/1504.04650","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JansenK15","ee":"http://arxiv.org/abs/1504.04650","url":"https://dblp.org/rec/journals/corr/JansenK15"}, "url":"URL#3678276" }, { "@score":"1", "@id":"3678283", "info":{"authors":{"author":[{"@pid":"131/6726","text":"Lucas Janson"},{"@pid":"143/7326","text":"Edward Schmerling"},{"@pid":"91/3382-1","text":"Marco Pavone 0001"}]},"title":"Monte Carlo Motion Planning for Robot Trajectory Optimization Under Uncertainty.","venue":"CoRR","volume":"abs/1504.08053","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JansonSP15","ee":"http://arxiv.org/abs/1504.08053","url":"https://dblp.org/rec/journals/corr/JansonSP15"}, "url":"URL#3678283" }, { "@score":"1", "@id":"3678294", "info":{"authors":{"author":[{"@pid":"125/2162","text":"Dorota Jarecka"},{"@pid":"125/2006","text":"Sylwester Arabas"},{"@pid":"149/5765","text":"Davide Del Vento"}]},"title":"Python bindings for libcloudph++.","venue":"CoRR","volume":"abs/1504.01161","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JareckaAV15","ee":"http://arxiv.org/abs/1504.01161","url":"https://dblp.org/rec/journals/corr/JareckaAV15"}, "url":"URL#3678294" }, { "@score":"1", "@id":"3678297", "info":{"authors":{"author":{"@pid":"116/7077","text":"Andrzej Jarynowski"}},"title":"HPV and cervical cancer in Moldova, epidemiological model with intervention cost vs benefit and effectiveness analysis.","venue":"CoRR","volume":"abs/1504.05383","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jarynowski15","ee":"http://arxiv.org/abs/1504.05383","url":"https://dblp.org/rec/journals/corr/Jarynowski15"}, "url":"URL#3678297" }, { "@score":"1", "@id":"3678331", "info":{"authors":{"author":[{"@pid":"116/5361","text":"Malek Jebabli"},{"@pid":"27/1589","text":"Hocine Cherifi"},{"@pid":"51/8461","text":"Chantal Cherifi"},{"@pid":"25/8192","text":"Atef Hamouda"}]},"title":"Overlapping Community Structure in Co-authorship Networks: a Case Study.","venue":"CoRR","volume":"abs/1504.00247","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JebabliCCH15","ee":"http://arxiv.org/abs/1504.00247","url":"https://dblp.org/rec/journals/corr/JebabliCCH15"}, "url":"URL#3678331" }, { "@score":"1", "@id":"3678332", "info":{"authors":{"author":[{"@pid":"162/0192","text":"Ismaël Jecker"},{"@pid":"90/6190","text":"Emmanuel Filiot"}]},"title":"Multi-Sequential Word Relations.","venue":"CoRR","volume":"abs/1504.03864","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JeckerF15","ee":"http://arxiv.org/abs/1504.03864","url":"https://dblp.org/rec/journals/corr/JeckerF15"}, "url":"URL#3678332" }, { "@score":"1", "@id":"3678366", "info":{"authors":{"author":{"@pid":"159/2183","text":"Monica Jha"}},"title":"Document Clustering using K-Medoids.","venue":"CoRR","volume":"abs/1504.01183","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Jha15","ee":"http://arxiv.org/abs/1504.01183","url":"https://dblp.org/rec/journals/corr/Jha15"}, "url":"URL#3678366" }, { "@score":"1", "@id":"3678397", "info":{"authors":{"author":[{"@pid":"06/180-1","text":"Zhen Jia 0001"},{"@pid":"w/LeiWang4","text":"Lei Wang 0004"},{"@pid":"12/2485","text":"Jianfeng Zhan"},{"@pid":"52/5615-2","text":"Lixin Zhang 0002"},{"@pid":"09/10964","text":"Chunjie Luo"},{"@pid":"23/6324","text":"Ninghui Sun"}]},"title":"Understanding Big Data Analytic Workloads on Modern Processors.","venue":"CoRR","volume":"abs/1504.04974","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiaWZZLS15","ee":"http://arxiv.org/abs/1504.04974","url":"https://dblp.org/rec/journals/corr/JiaWZZLS15"}, "url":"URL#3678397" }, { "@score":"1", "@id":"3678404", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"24/1518-32","text":"Xin Chen 0032"},{"@pid":"16/7701","text":"Shuwei Zhang"},{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"10/1991","text":"Weiqiang Kong"},{"@pid":"15/4777-1","text":"Tao Zhang 0001"}]},"title":"Software for Wearable Devices: Challenges and Opportunities.","venue":"CoRR","volume":"abs/1504.00747","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JiangCZZKZ15","ee":"http://arxiv.org/abs/1504.00747","url":"https://dblp.org/rec/journals/corr/JiangCZZKZ15"}, "url":"URL#3678404" }, { "@score":"1", "@id":"3678438", "info":{"authors":{"author":[{"@pid":"161/9868","text":"Kyong Hwan Jin"},{"@pid":"25/6543-5","text":"Dongwook Lee 0005"},{"@pid":"15/5613","text":"Jong Chul Ye"}]},"title":"A general framework for compressed sensing and parallel MRI using annihilating filter based low-rank Hankel matrix.","venue":"CoRR","volume":"abs/1504.00532","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JinLY15","ee":"http://arxiv.org/abs/1504.00532","url":"https://dblp.org/rec/journals/corr/JinLY15"}, "url":"URL#3678438" }, { "@score":"1", "@id":"3678454", "info":{"authors":{"author":[{"@pid":"117/3502","text":"Varun S. Jog"},{"@pid":"28/23","text":"Venkat Anantharam"}]},"title":"A Geometric Analysis of the AWGN channel with a $(σ, ρ)$-Power Constraint.","venue":"CoRR","volume":"abs/1504.05182","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JogA15","ee":"http://arxiv.org/abs/1504.05182","url":"https://dblp.org/rec/journals/corr/JogA15"}, "url":"URL#3678454" }, { "@score":"1", "@id":"3678466", "info":{"authors":{"author":[{"@pid":"68/9968","text":"Edward Johns"},{"@pid":"90/8653","text":"Oisin Mac Aodha"},{"@pid":"41/281","text":"Gabriel J. Brostow"}]},"title":"Becoming the Expert - Interactive Multi-Class Machine Teaching.","venue":"CoRR","volume":"abs/1504.07575","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JohnsAB15","ee":"http://arxiv.org/abs/1504.07575","url":"https://dblp.org/rec/journals/corr/JohnsAB15"}, "url":"URL#3678466" }, { "@score":"1", "@id":"3678468", "info":{"authors":{"author":[{"@pid":"66/1605","text":"Rie Johnson"},{"@pid":"07/4227-1","text":"Tong Zhang 0001"}]},"title":"Semi-Supervised Learning with Multi-View Embedding: Theory and Application with Convolutional Neural Networks.","venue":"CoRR","volume":"abs/1504.01255","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Johnson015","ee":"http://arxiv.org/abs/1504.01255","url":"https://dblp.org/rec/journals/corr/Johnson015"}, "url":"URL#3678468" }, { "@score":"1", "@id":"3678469", "info":{"authors":{"author":{"@pid":"122/3036","text":"James Ian Johnson"}},"title":"Automating Abstract Interpretation of Abstract Machines.","venue":"CoRR","volume":"abs/1504.08033","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Johnson15","ee":"http://arxiv.org/abs/1504.08033","url":"https://dblp.org/rec/journals/corr/Johnson15"}, "url":"URL#3678469" }, { "@score":"1", "@id":"3678499", "info":{"authors":{"author":[{"@pid":"133/8319","text":"Corinne L. Jones"},{"@pid":"124/2354","text":"Robert A. Bridges"},{"@pid":"161/9915","text":"Kelly M. T. Huffer"},{"@pid":"89/6585","text":"John R. Goodall"}]},"title":"Towards a relation extraction framework for cyber-security concepts.","venue":"CoRR","volume":"abs/1504.04317","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JonesBHG15","ee":"http://arxiv.org/abs/1504.04317","url":"https://dblp.org/rec/journals/corr/JonesBHG15"}, "url":"URL#3678499" }, { "@score":"1", "@id":"3678506", "info":{"authors":{"author":[{"@pid":"j/PeterJonsson","text":"Peter Jonsson"},{"@pid":"85/5777","text":"Marco Kuhlmann"}]},"title":"Maximum Pagenumber-k Subgraph is NP-Complete.","venue":"CoRR","volume":"abs/1504.05908","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JonssonK15","ee":"http://arxiv.org/abs/1504.05908","url":"https://dblp.org/rec/journals/corr/JonssonK15"}, "url":"URL#3678506" }, { "@score":"1", "@id":"3678538", "info":{"authors":{"author":[{"@pid":"162/0003","text":"Rafal Józefowicz"},{"@pid":"43/8484-1","text":"Wojciech Marian Czarnecki"}]},"title":"Fast optimization of Multithreshold Entropy Linear Classifier.","venue":"CoRR","volume":"abs/1504.04739","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JozefowiczC15","ee":"http://arxiv.org/abs/1504.04739","url":"https://dblp.org/rec/journals/corr/JozefowiczC15"}, "url":"URL#3678538" }, { "@score":"1", "@id":"3678551", "info":{"authors":{"author":[{"@pid":"129/1520","text":"Sang Yeob Jung"},{"@pid":"32/673","text":"Seong-Lyun Kim"}]},"title":"Viability of Reverse Pricing in Cellular Networks: A New Outlook on Resource Management.","venue":"CoRR","volume":"abs/1504.06395","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/JungK15","ee":"http://arxiv.org/abs/1504.06395","url":"https://dblp.org/rec/journals/corr/JungK15"}, "url":"URL#3678551" }, { "@score":"1", "@id":"3678598", "info":{"authors":{"author":[{"@pid":"30/41","text":"Volker Kaibel"},{"@pid":"90/4448","text":"Jon Lee 0001"},{"@pid":"41/8724","text":"Matthias Walter"},{"@pid":"129/2840","text":"Stefan Weltge"}]},"title":"Extended Formulations for Independence Polytopes of Regular Matroids.","venue":"CoRR","volume":"abs/1504.03872","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaibelLWW15","ee":"http://arxiv.org/abs/1504.03872","url":"https://dblp.org/rec/journals/corr/KaibelLWW15"}, "url":"URL#3678598" }, { "@score":"1", "@id":"3678599", "info":{"authors":{"author":[{"@pid":"132/8938","text":"Bhavya Kailkhura"},{"@pid":"35/5335","text":"Swastik Brahma"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"Consensus based Detection in the Presence of Data Falsification Attacks.","venue":"CoRR","volume":"abs/1504.03413","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KailkhuraBV15","ee":"http://arxiv.org/abs/1504.03413","url":"https://dblp.org/rec/journals/corr/KailkhuraBV15"}, "url":"URL#3678599" }, { "@score":"1", "@id":"3678609", "info":{"authors":{"author":{"@pid":"47/717","text":"Subhash C. Kak"}},"title":"Oblivious Transfer Protocol with Verification.","venue":"CoRR","volume":"abs/1504.00601","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kak15a","ee":"http://arxiv.org/abs/1504.00601","url":"https://dblp.org/rec/journals/corr/Kak15a"}, "url":"URL#3678609" }, { "@score":"1", "@id":"3678635", "info":{"authors":{"author":[{"@pid":"139/0893","text":"Nayan Jyoti Kalita"},{"@pid":"162/0097","text":"Baharul Islam"}]},"title":"Bengali to Assamese Statistical Machine Translation using Moses (Corpus Based).","venue":"CoRR","volume":"abs/1504.01182","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KalitaI15","ee":"http://arxiv.org/abs/1504.01182","url":"https://dblp.org/rec/journals/corr/KalitaI15"}, "url":"URL#3678635" }, { "@score":"1", "@id":"3678660", "info":{"authors":{"author":{"@pid":"64/11536","text":"Ahmad Kamal"}},"title":"Review Mining for Feature Based Opinion Summarization and Visualization.","venue":"CoRR","volume":"abs/1504.03068","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kamal15","ee":"http://arxiv.org/abs/1504.03068","url":"https://dblp.org/rec/journals/corr/Kamal15"}, "url":"URL#3678660" }, { "@score":"1", "@id":"3678680", "info":{"authors":{"author":[{"@pid":"73/6825","text":"Mark Kaminski"},{"@pid":"71/6448","text":"Bernardo Cuenca Grau"}]},"title":"Computing Horn Rewritings of Description Logics Ontologies.","venue":"CoRR","volume":"abs/1504.05150","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaminskiG15","ee":"http://arxiv.org/abs/1504.05150","url":"https://dblp.org/rec/journals/corr/KaminskiG15"}, "url":"URL#3678680" }, { "@score":"1", "@id":"3678683", "info":{"authors":{"author":[{"@pid":"16/9056","text":"Lior Kamma"},{"@pid":"k/RobertKrauthgamer","text":"Robert Krauthgamer"}]},"title":"Metric Decompositions of Path-Separable Graphs.","venue":"CoRR","volume":"abs/1504.07019","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KammaK15","ee":"http://arxiv.org/abs/1504.07019","url":"https://dblp.org/rec/journals/corr/KammaK15"}, "url":"URL#3678683" }, { "@score":"1", "@id":"3678686", "info":{"authors":{"author":[{"@pid":"52/6564","text":"Abla Kammoun"},{"@pid":"00/2812","text":"Romain Couillet"},{"@pid":"05/1851-1","text":"Frédéric Pascal 0001"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"Convergence and Fluctuations of Regularized Tyler Estimators.","venue":"CoRR","volume":"abs/1504.01252","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KammounCPA15","ee":"http://arxiv.org/abs/1504.01252","url":"https://dblp.org/rec/journals/corr/KammounCPA15"}, "url":"URL#3678686" }, { "@score":"1", "@id":"3678695", "info":{"authors":{"author":[{"@pid":"93/11266","text":"Vivek Kandiah"},{"@pid":"161/9812","text":"H. Escaith"},{"@pid":"30/3449","text":"D. L. Shepelyansky"}]},"title":"Google matrix of the world network of economic activities.","venue":"CoRR","volume":"abs/1504.06773","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KandiahES15","ee":"http://arxiv.org/abs/1504.06773","url":"https://dblp.org/rec/journals/corr/KandiahES15"}, "url":"URL#3678695" }, { "@score":"1", "@id":"3678703", "info":{"authors":{"author":[{"@pid":"85/8172","text":"Jeon-Hyung Kang"},{"@pid":"99/433","text":"Kristina Lerman"}]},"title":"User Effort and Network Structure Mediate Access to Information in Networks.","venue":"CoRR","volume":"abs/1504.01760","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KangL15a","ee":"http://arxiv.org/abs/1504.01760","url":"https://dblp.org/rec/journals/corr/KangL15a"}, "url":"URL#3678703" }, { "@score":"1", "@id":"3678714", "info":{"authors":{"author":[{"@pid":"162/0109","text":"Yangyang Kang"},{"@pid":"52/5331","text":"Zhihua Zhang"},{"@pid":"26/988","text":"Wu-Jun Li"}]},"title":"On the Global Convergence of Majorization Minimization Algorithms for Nonconvex Optimization Problems.","venue":"CoRR","volume":"abs/1504.07791","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KangZL15","ee":"http://arxiv.org/abs/1504.07791","url":"https://dblp.org/rec/journals/corr/KangZL15"}, "url":"URL#3678714" }, { "@score":"1", "@id":"3678725", "info":{"authors":{"author":[{"@pid":"95/5094","text":"Mamadou Moustapha Kanté"},{"@pid":"87/5080-2","text":"Eun Jung Kim 0002"},{"@pid":"143/7283","text":"O-joung Kwon"},{"@pid":"51/6396","text":"Christophe Paul"}]},"title":"FPT Algorithm and Polynomial Kernel for Linear Rank-width One Vertex Deletion.","venue":"CoRR","volume":"abs/1504.05905","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kante0KP15","ee":"http://arxiv.org/abs/1504.05905","url":"https://dblp.org/rec/journals/corr/Kante0KP15"}, "url":"URL#3678725" }, { "@score":"1", "@id":"3678726", "info":{"authors":{"author":[{"@pid":"92/6079","text":"Erez Kantor"},{"@pid":"k/ShayKutten","text":"Shay Kutten"}]},"title":"Optimal competitiveness for the Rectilinear Steiner Arborescence problem.","venue":"CoRR","volume":"abs/1504.08265","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KantorK15","ee":"http://arxiv.org/abs/1504.08265","url":"https://dblp.org/rec/journals/corr/KantorK15"}, "url":"URL#3678726" }, { "@score":"1", "@id":"3678727", "info":{"authors":{"author":[{"@pid":"146/0779","text":"David T. H. Kao"},{"@pid":"18/3725","text":"Mohammad Ali Maddah-Ali"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Blind Index Coding.","venue":"CoRR","volume":"abs/1504.06018","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaoMA15","ee":"http://arxiv.org/abs/1504.06018","url":"https://dblp.org/rec/journals/corr/KaoMA15"}, "url":"URL#3678727" }, { "@score":"1", "@id":"3678729", "info":{"authors":{"author":[{"@pid":"12/8658","text":"Andrzej Kapanowski"},{"@pid":"161/9830","text":"L. Galuszka"}]},"title":"Weighted graph algorithms with Python.","venue":"CoRR","volume":"abs/1504.07828","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KapanowskiG15","ee":"http://arxiv.org/abs/1504.07828","url":"https://dblp.org/rec/journals/corr/KapanowskiG15"}, "url":"URL#3678729" }, { "@score":"1", "@id":"3678734", "info":{"authors":{"author":[{"@pid":"72/8966","text":"Dzevdan Kapetanovic"},{"@pid":"74/6653","text":"Gan Zheng"},{"@pid":"14/875","text":"Fredrik Rusek"}]},"title":"Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks.","venue":"CoRR","volume":"abs/1504.07154","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KapetanovicZR15","ee":"http://arxiv.org/abs/1504.07154","url":"https://dblp.org/rec/journals/corr/KapetanovicZR15"}, "url":"URL#3678734" }, { "@score":"1", "@id":"3678740", "info":{"authors":{"author":[{"@pid":"155/3378","text":"David Kappel"},{"@pid":"126/1787","text":"Stefan Habenschuss"},{"@pid":"54/683","text":"Robert Legenstein"},{"@pid":"m/WolfgangMaass","text":"Wolfgang Maass 0001"}]},"title":"Network Plasticity as Bayesian Inference.","venue":"CoRR","volume":"abs/1504.05143","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KappelHLM15","ee":"http://arxiv.org/abs/1504.05143","url":"https://dblp.org/rec/journals/corr/KappelHLM15"}, "url":"URL#3678740" }, { "@score":"1", "@id":"3678748", "info":{"authors":{"author":{"@pid":"50/1871","text":"Koray Karabina"}},"title":"Point Decomposition Problem in Binary Elliptic Curves.","venue":"CoRR","volume":"abs/1504.02347","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Karabina15","ee":"http://arxiv.org/abs/1504.02347","url":"https://dblp.org/rec/journals/corr/Karabina15"}, "url":"URL#3678748" }, { "@score":"1", "@id":"3678756", "info":{"authors":{"author":[{"@pid":"81/11533","text":"Can Karakus"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"Opportunistic Scheduling for Full-Duplex Uplink-Downlink Networks.","venue":"CoRR","volume":"abs/1504.05898","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarakusD15","ee":"http://arxiv.org/abs/1504.05898","url":"https://dblp.org/rec/journals/corr/KarakusD15"}, "url":"URL#3678756" }, { "@score":"1", "@id":"3678760", "info":{"authors":{"author":[{"@pid":"43/10726","text":"Dmytro Karamshuk"},{"@pid":"12/6462","text":"Nishanth Sastry"},{"@pid":"97/4613","text":"Andrew Secker"},{"@pid":"40/435","text":"Jigna Chandaria"}]},"title":"ISP-friendly Peer-assisted On-demand Streaming of Long Duration Content in BBC iPlayer.","venue":"CoRR","volume":"abs/1504.03536","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaramshukSSC15","ee":"http://arxiv.org/abs/1504.03536","url":"https://dblp.org/rec/journals/corr/KaramshukSSC15"}, "url":"URL#3678760" }, { "@score":"1", "@id":"3678761", "info":{"authors":{"author":[{"@pid":"43/10726","text":"Dmytro Karamshuk"},{"@pid":"12/6462","text":"Nishanth Sastry"},{"@pid":"97/4613","text":"Andrew Secker"},{"@pid":"40/435","text":"Jigna Chandaria"}]},"title":"On Factors Affecting the Usage and Adoption of a Nation-wide TV Streaming Service.","venue":"CoRR","volume":"abs/1504.03542","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KaramshukSSC15a","ee":"http://arxiv.org/abs/1504.03542","url":"https://dblp.org/rec/journals/corr/KaramshukSSC15a"}, "url":"URL#3678761" }, { "@score":"1", "@id":"3678782", "info":{"authors":{"author":[{"@pid":"122/5546","text":"Mohammad S. Karim"},{"@pid":"28/2887","text":"Parastoo Sadeghi"},{"@pid":"98/1677","text":"Sameh Sorour"},{"@pid":"35/8332","text":"Neda Aboutorab"}]},"title":"Instantly Decodable Network Coding for Real-Time Scalable Video Broadcast over Wireless Networks.","venue":"CoRR","volume":"abs/1504.01218","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarimSSA15","ee":"http://arxiv.org/abs/1504.01218","url":"https://dblp.org/rec/journals/corr/KarimSSA15"}, "url":"URL#3678782" }, { "@score":"1", "@id":"3678804", "info":{"authors":{"author":{"@pid":"62/4649","text":"T. Karthick"}},"title":"Weighted Independent Sets in a Subclass of $P_6$-free Graphs.","venue":"CoRR","volume":"abs/1504.05401","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Karthick15","ee":"http://arxiv.org/abs/1504.05401","url":"https://dblp.org/rec/journals/corr/Karthick15"}, "url":"URL#3678804" }, { "@score":"1", "@id":"3678807", "info":{"authors":{"author":[{"@pid":"61/7234","text":"Alexander Kartzow"},{"@pid":"46/9845","text":"Thomas Weidner"}]},"title":"Model Checking Constraint LTL over Trees.","venue":"CoRR","volume":"abs/1504.06105","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KartzowW15","ee":"http://arxiv.org/abs/1504.06105","url":"https://dblp.org/rec/journals/corr/KartzowW15"}, "url":"URL#3678807" }, { "@score":"1", "@id":"3678811", "info":{"authors":{"author":[{"@pid":"94/8363","text":"Mina Karzand"},{"@pid":"36/4028","text":"Lav R. Varshney"}]},"title":"Communication Strategies for Low-Latency Trading.","venue":"CoRR","volume":"abs/1504.07227","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KarzandV15","ee":"http://arxiv.org/abs/1504.07227","url":"https://dblp.org/rec/journals/corr/KarzandV15"}, "url":"URL#3678811" }, { "@score":"1", "@id":"3678817", "info":{"authors":{"author":{"@pid":"162/0008","text":"Yury Kashnitsky"}},"title":"Visual analytics in FCA-based clustering.","venue":"CoRR","volume":"abs/1504.05469","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kashnitsky15","ee":"http://arxiv.org/abs/1504.05469","url":"https://dblp.org/rec/journals/corr/Kashnitsky15"}, "url":"URL#3678817" }, { "@score":"1", "@id":"3678818", "info":{"authors":{"author":[{"@pid":"162/0008","text":"Yury Kashnitsky"},{"@pid":"21/5524","text":"Dmitry I. Ignatov"}]},"title":"Can FCA-based Recommender System Suggest a Proper Classifier?","venue":"CoRR","volume":"abs/1504.05473","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KashnitskyI15","ee":"http://arxiv.org/abs/1504.05473","url":"https://dblp.org/rec/journals/corr/KashnitskyI15"}, "url":"URL#3678818" }, { "@score":"1", "@id":"3678822", "info":{"authors":{"author":[{"@pid":"67/1300","text":"Shiva Prasad Kasiviswanathan"},{"@pid":"21/158","text":"Mark Rudelson"}]},"title":"Spectral Norm of Random Kernel Matrices with Applications to Privacy.","venue":"CoRR","volume":"abs/1504.05880","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kasiviswanathan15","ee":"http://arxiv.org/abs/1504.05880","url":"https://dblp.org/rec/journals/corr/Kasiviswanathan15"}, "url":"URL#3678822" }, { "@score":"1", "@id":"3678824", "info":{"authors":{"author":[{"@pid":"62/3145","text":"Adam Kasperski"},{"@pid":"72/5778","text":"Pawel Zielinski 0001"}]},"title":"Using the WOWA operator in robust discrete optimization problems.","venue":"CoRR","volume":"abs/1504.07863","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KasperskiZ15","ee":"http://arxiv.org/abs/1504.07863","url":"https://dblp.org/rec/journals/corr/KasperskiZ15"}, "url":"URL#3678824" }, { "@score":"1", "@id":"3678850", "info":{"authors":{"author":[{"@pid":"121/2238","text":"R. Kavitha"},{"@pid":"r/BSundarRajan","text":"B. Sundar Rajan"}]},"title":"On the Number of Optimal Index Codes.","venue":"CoRR","volume":"abs/1504.05008","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KavithaR15","ee":"http://arxiv.org/abs/1504.05008","url":"https://dblp.org/rec/journals/corr/KavithaR15"}, "url":"URL#3678850" }, { "@score":"1", "@id":"3678868", "info":{"authors":{"author":[{"@pid":"04/9461","text":"Md. Imrul Kayes"},{"@pid":"33/5916","text":"Adriana Iamnitchi"}]},"title":"A Survey on Privacy and Security in Online Social Networks.","venue":"CoRR","volume":"abs/1504.03342","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KayesI15","ee":"http://arxiv.org/abs/1504.03342","url":"https://dblp.org/rec/journals/corr/KayesI15"}, "url":"URL#3678868" }, { "@score":"1", "@id":"3678894", "info":{"authors":{"author":[{"@pid":"56/2692-2","text":"Matthias Keil 0002"},{"@pid":"161/9882","text":"Sankha Narayan Guria"},{"@pid":"162/0193","text":"Andreas Schlegel"},{"@pid":"07/1996","text":"Manuel Geffken"},{"@pid":"t/PeterThiemann","text":"Peter Thiemann 0001"}]},"title":"Transparent Object Proxies for JavaScript.","venue":"CoRR","volume":"abs/1504.08100","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KeilGSGT15","ee":"http://arxiv.org/abs/1504.08100","url":"https://dblp.org/rec/journals/corr/KeilGSGT15"}, "url":"URL#3678894" }, { "@score":"1", "@id":"3678895", "info":{"authors":{"author":[{"@pid":"56/2692-2","text":"Matthias Keil 0002"},{"@pid":"t/PeterThiemann","text":"Peter Thiemann 0001"}]},"title":"TreatJS: Higher-Order Contracts for JavaScript.","venue":"CoRR","volume":"abs/1504.08110","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KeilT15","ee":"http://arxiv.org/abs/1504.08110","url":"https://dblp.org/rec/journals/corr/KeilT15"}, "url":"URL#3678895" }, { "@score":"1", "@id":"3678900", "info":{"authors":{"author":[{"@pid":"88/5973","text":"Mark Kelbert"},{"@pid":"162/0189","text":"Pavel Mozgunov"}]},"title":"Asymptotic behaviour of weighted differential entropies in a Bayesian problem.","venue":"CoRR","volume":"abs/1504.01612","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KelbertM15","ee":"http://arxiv.org/abs/1504.01612","url":"https://dblp.org/rec/journals/corr/KelbertM15"}, "url":"URL#3678900" }, { "@score":"1", "@id":"3678907", "info":{"authors":{"author":[{"@pid":"29/7128","text":"Georgios Kellaris"},{"@pid":"82/75","text":"Stavros Papadopoulos 0001"},{"@pid":"p/DimitrisPapadias","text":"Dimitris Papadias"}]},"title":"Differentially Private Histograms for Range-Sum Queries: A Modular Approach.","venue":"CoRR","volume":"abs/1504.03440","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KellarisPP15","ee":"http://arxiv.org/abs/1504.03440","url":"https://dblp.org/rec/journals/corr/KellarisPP15"}, "url":"URL#3678907" }, { "@score":"1", "@id":"3678915", "info":{"authors":{"author":[{"@pid":"116/6690","text":"Amina Kemmar"},{"@pid":"79/3951","text":"Samir Loudni"},{"@pid":"25/423","text":"Yahia Lebbah"},{"@pid":"29/2067","text":"Patrice Boizumault"},{"@pid":"29/2665","text":"Thierry Charnois"}]},"title":"Prefix-Projection Global Constraint for Sequential Pattern Mining.","venue":"CoRR","volume":"abs/1504.07877","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KemmarLLBC15","ee":"http://arxiv.org/abs/1504.07877","url":"https://dblp.org/rec/journals/corr/KemmarLLBC15"}, "url":"URL#3678915" }, { "@score":"1", "@id":"3678930", "info":{"authors":{"author":[{"@pid":"25/6583","text":"Jeremy Kepner"},{"@pid":"41/3005","text":"David A. Bader"},{"@pid":"80/1552","text":"Aydin Buluç"},{"@pid":"g/JohnRGilbert","text":"John R. Gilbert"},{"@pid":"56/794","text":"Timothy G. Mattson"},{"@pid":"55/3065","text":"Henning Meyerhenke"}]},"title":"Graphs, Matrices, and the GraphBLAS: Seven Good Reasons.","venue":"CoRR","volume":"abs/1504.01039","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KepnerBBGMM15","ee":"http://arxiv.org/abs/1504.01039","url":"https://dblp.org/rec/journals/corr/KepnerBBGMM15"}, "url":"URL#3678930" }, { "@score":"1", "@id":"3678970", "info":{"authors":{"author":[{"@pid":"94/8191","text":"Mohammed Khader"},{"@pid":"b/ABenHamza","text":"A. Ben Hamza"}]},"title":"A Multicomponent Approach to Nonrigid Registration of Diffusion Tensor Images.","venue":"CoRR","volume":"abs/1504.01800","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhaderH15","ee":"http://arxiv.org/abs/1504.01800","url":"https://dblp.org/rec/journals/corr/KhaderH15"}, "url":"URL#3678970" }, { "@score":"1", "@id":"3678990", "info":{"authors":{"author":[{"@pid":"144/7839","text":"Mahmoud Abo Khamis"},{"@pid":"n/HungQNgo","text":"Hung Q. Ngo 0001"},{"@pid":"04/4980","text":"Atri Rudra"}]},"title":"FAQ: Questions Asked Frequently.","venue":"CoRR","volume":"abs/1504.04044","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhamisNRR15","ee":"http://arxiv.org/abs/1504.04044","url":"https://dblp.org/rec/journals/corr/KhamisNRR15"}, "url":"URL#3678990" }, { "@score":"1", "@id":"3679001", "info":{"authors":{"author":[{"@pid":"123/4475","text":"Sadeque Reza Khan"},{"@pid":"162/0147","text":"Farzana Sultana Dristy"}]},"title":"Android based security and home automation system.","venue":"CoRR","volume":"abs/1504.03564","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanD15","ee":"http://arxiv.org/abs/1504.03564","url":"https://dblp.org/rec/journals/corr/KhanD15"}, "url":"URL#3679001" }, { "@score":"1", "@id":"3679005", "info":{"authors":{"author":[{"@pid":"66/4624","text":"Shehroz S. Khan"},{"@pid":"73/7255","text":"Michelle E. Karg"},{"@pid":"07/3042","text":"Dana Kulic"},{"@pid":"35/1222","text":"Jesse Hoey"}]},"title":"Detecting falls with X-Factor HMMs when the training data for falls is not available.","venue":"CoRR","volume":"abs/1504.02141","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanKKH15","ee":"http://arxiv.org/abs/1504.02141","url":"https://dblp.org/rec/journals/corr/KhanKKH15"}, "url":"URL#3679005" }, { "@score":"1", "@id":"3679007", "info":{"authors":{"author":[{"@pid":"27/9281","text":"Muhammad Asad Khan"},{"@pid":"136/3384","text":"Amir Ali Khan"},{"@pid":"46/7428","text":"Fauzan Mirza"}]},"title":"CRT and Fixed Patterns in Combinatorial Sequences.","venue":"CoRR","volume":"abs/1504.01099","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanKM15a","ee":"http://arxiv.org/abs/1504.01099","url":"https://dblp.org/rec/journals/corr/KhanKM15a"}, "url":"URL#3679007" }, { "@score":"1", "@id":"3679012", "info":{"authors":{"author":[{"@pid":"10/8398","text":"Mohammed Shafiul Alam Khan"},{"@pid":"m/ChrisJMitchell","text":"Chris J. Mitchell"}]},"title":"Improving Air Interface User Privacy in Mobile Telephony.","venue":"CoRR","volume":"abs/1504.03287","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhanM15","ee":"http://arxiv.org/abs/1504.03287","url":"https://dblp.org/rec/journals/corr/KhanM15"}, "url":"URL#3679012" }, { "@score":"1", "@id":"3679025", "info":{"authors":{"author":[{"@pid":"162/0195","text":"Swapnil Kharche"},{"@pid":"161/9948","text":"Jagdish patil"},{"@pid":"162/0023","text":"Kanchan Gohad"},{"@pid":"162/0102","text":"Bharti Ambetkar"}]},"title":"Preventing SQL Injection attack using pattern matching algorithm.","venue":"CoRR","volume":"abs/1504.06920","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KharchepGA15","ee":"http://arxiv.org/abs/1504.06920","url":"https://dblp.org/rec/journals/corr/KharchepGA15"}, "url":"URL#3679025" }, { "@score":"1", "@id":"3679028", "info":{"authors":{"author":[{"@pid":"144/7574","text":"Santosh Khasanvis"},{"@pid":"82/2094","text":"Mingyu Li"},{"@pid":"144/7614","text":"Mostafizur Rahman"},{"@pid":"161/9905","text":"Mohammad Salehi Fashami"},{"@pid":"89/7684","text":"Ayan Kumar Biswas"},{"@pid":"162/0203","text":"Jayasimha Atulasimha"},{"@pid":"86/9056","text":"Supriyo Bandyopadhyay"},{"@pid":"m/CsabaAndrasMoritz","text":"Csaba Andras Moritz"}]},"title":"Self-similar Magneto-electric Nanocircuit Technology for Probabilistic Inference Engines.","venue":"CoRR","volume":"abs/1504.04056","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhasanvisLRFBAB15","ee":"http://arxiv.org/abs/1504.04056","url":"https://dblp.org/rec/journals/corr/KhasanvisLRFBAB15"}, "url":"URL#3679028" }, { "@score":"1", "@id":"3679030", "info":{"authors":{"author":{"@pid":"124/0658","text":"Arash Khatamianfar"}},"title":"Advanced Discrete-Time Control Methods for Industrial Applications.","venue":"CoRR","volume":"abs/1504.04423","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Khatamianfar15","ee":"http://arxiv.org/abs/1504.04423","url":"https://dblp.org/rec/journals/corr/Khatamianfar15"}, "url":"URL#3679030" }, { "@score":"1", "@id":"3679032", "info":{"authors":{"author":[{"@pid":"01/9664","text":"Awais Khawar"},{"@pid":"12/8356","text":"Ahmed Abdel-Hadi"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"Channel Modeling between Seaborne MIMO Radar and MIMO Cellular System.","venue":"CoRR","volume":"abs/1504.04325","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhawarAC15","ee":"http://arxiv.org/abs/1504.04325","url":"https://dblp.org/rec/journals/corr/KhawarAC15"}, "url":"URL#3679032" }, { "@score":"1", "@id":"3679033", "info":{"authors":{"author":[{"@pid":"01/9664","text":"Awais Khawar"},{"@pid":"12/8356","text":"Ahmed Abdel-Hadi"},{"@pid":"73/1462","text":"T. Charles Clancy"}]},"title":"3D Channel Modeling between Seaborne MIMO Radar and MIMO Cellular System.","venue":"CoRR","volume":"abs/1504.04333","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhawarAC15a","ee":"http://arxiv.org/abs/1504.04333","url":"https://dblp.org/rec/journals/corr/KhawarAC15a"}, "url":"URL#3679033" }, { "@score":"1", "@id":"3679040", "info":{"authors":{"author":[{"@pid":"135/7980","text":"Saeed Reza Kheradpisheh"},{"@pid":"70/8849","text":"Mohammad Ganjtabesh"},{"@pid":"07/7226","text":"Timothée Masquelier"}]},"title":"Bio-inspired Unsupervised Learning of Visual Features Leads to Robust Invariant Object Recognition.","venue":"CoRR","volume":"abs/1504.03871","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KheradpishehGM15","ee":"http://arxiv.org/abs/1504.03871","url":"https://dblp.org/rec/journals/corr/KheradpishehGM15"}, "url":"URL#3679040" }, { "@score":"1", "@id":"3679045", "info":{"authors":{"author":[{"@pid":"132/9401","text":"Youssef Khmou"},{"@pid":"132/9396","text":"Said Safi"}]},"title":"An original Propagator for large array.","venue":"CoRR","volume":"abs/1504.01661","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KhmouS15","ee":"http://arxiv.org/abs/1504.01661","url":"https://dblp.org/rec/journals/corr/KhmouS15"}, "url":"URL#3679045" }, { "@score":"1", "@id":"3679070", "info":{"authors":{"author":[{"@pid":"83/8037","text":"Abbas Kiani"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Profit Maximization for Geographical Dispersed Green Data Centers.","venue":"CoRR","volume":"abs/1504.01782","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KianiA15","ee":"http://arxiv.org/abs/1504.01782","url":"https://dblp.org/rec/journals/corr/KianiA15"}, "url":"URL#3679070" }, { "@score":"1", "@id":"3679082", "info":{"authors":{"author":{"@pid":"154/6616","text":"Bryce M. Kim"}},"title":"Analog Computer Understanding of Hamiltonian Paths.","venue":"CoRR","volume":"abs/1504.05429","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kim15b","ee":"http://arxiv.org/abs/1504.05429","url":"https://dblp.org/rec/journals/corr/Kim15b"}, "url":"URL#3679082" }, { "@score":"1", "@id":"3679116", "info":{"authors":{"author":[{"@pid":"27/7416","text":"Song-Ju Kim"},{"@pid":"15/347","text":"Makoto Naruse"},{"@pid":"17/925","text":"Masashi Aono"}]},"title":"Harnessing Natural Fluctuations: Analogue Computer for Efficient Socially Maximal Decision Making.","venue":"CoRR","volume":"abs/1504.03451","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimNA15","ee":"http://arxiv.org/abs/1504.03451","url":"https://dblp.org/rec/journals/corr/KimNA15"}, "url":"URL#3679116" }, { "@score":"1", "@id":"3679125", "info":{"authors":{"author":[{"@pid":"162/0031","text":"Jeemin Kim"},{"@pid":"136/5609","text":"Jihong Park"},{"@pid":"315/0884","text":"Seung-Woo Ko"},{"@pid":"32/673","text":"Seong-Lyun Kim"}]},"title":"User Attraction via Wireless Charging in Cellular Networks.","venue":"CoRR","volume":"abs/1504.05358","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KimPKK15","ee":"http://arxiv.org/abs/1504.05358","url":"https://dblp.org/rec/journals/corr/KimPKK15"}, "url":"URL#3679125" }, { "@score":"1", "@id":"3679143", "info":{"authors":{"author":[{"@pid":"39/4771","text":"Guy Kindler"},{"@pid":"42/3927","text":"Alexandra Kolla"},{"@pid":"t/LucaTrevisan","text":"Luca Trevisan"}]},"title":"Approximation of non-boolean 2CSP.","venue":"CoRR","volume":"abs/1504.00681","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KindlerKT15","ee":"http://arxiv.org/abs/1504.00681","url":"https://dblp.org/rec/journals/corr/KindlerKT15"}, "url":"URL#3679143" }, { "@score":"1", "@id":"3679180", "info":{"authors":{"author":[{"@pid":"72/7260","text":"Aleks Kissinger"},{"@pid":"144/7467","text":"Vladimir Zamdzhiev"}]},"title":"Equational reasoning with context-free families of string diagrams.","venue":"CoRR","volume":"abs/1504.02716","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KissingerZ15b","ee":"http://arxiv.org/abs/1504.02716","url":"https://dblp.org/rec/journals/corr/KissingerZ15b"}, "url":"URL#3679180" }, { "@score":"1", "@id":"3679184", "info":{"authors":{"author":[{"@pid":"96/10942","text":"Kittipong Kittichokechai"},{"@pid":"19/2492","text":"Giuseppe Caire"}]},"title":"Secret key-based Authentication with a Privacy Constraint.","venue":"CoRR","volume":"abs/1504.01614","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KittichokechaiC15","ee":"http://arxiv.org/abs/1504.01614","url":"https://dblp.org/rec/journals/corr/KittichokechaiC15"}, "url":"URL#3679184" }, { "@score":"1", "@id":"3679197", "info":{"authors":{"author":[{"@pid":"80/8313-1","text":"Felix Klein 0001"},{"@pid":"70/5831-2","text":"Martin Zimmermann 0002"}]},"title":"What are Strategies in Delay Games? Borel Determinacy for Games with Lookahead.","venue":"CoRR","volume":"abs/1504.02627","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Klein015","ee":"http://arxiv.org/abs/1504.02627","url":"https://dblp.org/rec/journals/corr/Klein015"}, "url":"URL#3679197" }, { "@score":"1", "@id":"3679203", "info":{"authors":{"author":[{"@pid":"143/7452","text":"Kaj-Kolja Kleineberg"},{"@pid":"55/427","text":"Marián Boguñá"}]},"title":"A 1: 1000 scale model of the digital world: Global connectivity can lead to the extinction of local networks.","venue":"CoRR","volume":"abs/1504.01368","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KleinebergB15","ee":"http://arxiv.org/abs/1504.01368","url":"https://dblp.org/rec/journals/corr/KleinebergB15"}, "url":"URL#3679203" }, { "@score":"1", "@id":"3679212", "info":{"authors":{"author":[{"@pid":"97/364","text":"Radoslaw Klimek"},{"@pid":"88/1528","text":"Leszek Kotulski"}]},"title":"Towards a better understanding and behavior recognition of inhabitants in smart cities. A public transport case.","venue":"CoRR","volume":"abs/1504.06044","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KlimekK15","ee":"http://arxiv.org/abs/1504.06044","url":"https://dblp.org/rec/journals/corr/KlimekK15"}, "url":"URL#3679212" }, { "@score":"1", "@id":"3679218", "info":{"authors":{"author":[{"@pid":"116/2776","text":"Vadym Kliuchnikov"},{"@pid":"32/9225","text":"Jon Yard"}]},"title":"A framework for exact synthesis.","venue":"CoRR","volume":"abs/1504.04350","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KliuchnikovY15","ee":"http://arxiv.org/abs/1504.04350","url":"https://dblp.org/rec/journals/corr/KliuchnikovY15"}, "url":"URL#3679218" }, { "@score":"1", "@id":"3679228", "info":{"authors":{"author":[{"@pid":"67/1480","text":"Kolja Knauer"},{"@pid":"71/8037","text":"Petru Valicov"}]},"title":"Planar digraphs without large acyclic sets.","venue":"CoRR","volume":"abs/1504.06726","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KnauerV15","ee":"http://arxiv.org/abs/1504.06726","url":"https://dblp.org/rec/journals/corr/KnauerV15"}, "url":"URL#3679228" }, { "@score":"1", "@id":"3679261", "info":{"authors":{"author":{"@pid":"92/3127","text":"Tobias Koch"}},"title":"The Shannon Lower Bound is Asymptotically Tight for Sources with Finite Renyi Information Dimension.","venue":"CoRR","volume":"abs/1504.08245","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Koch15","ee":"http://arxiv.org/abs/1504.08245","url":"https://dblp.org/rec/journals/corr/Koch15"}, "url":"URL#3679261" }, { "@score":"1", "@id":"3679265", "info":{"authors":{"author":[{"@pid":"162/0012","text":"Anton Kochnev"},{"@pid":"162/0044","text":"Nicolai Savelov"}]},"title":"Symmetric matrix inversion using modified Gaussian elimination.","venue":"CoRR","volume":"abs/1504.06734","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KochnevS15","ee":"http://arxiv.org/abs/1504.06734","url":"https://dblp.org/rec/journals/corr/KochnevS15"}, "url":"URL#3679265" }, { "@score":"1", "@id":"3679283", "info":{"authors":{"author":[{"@pid":"05/5841","text":"Silvija Kokalj-Filipovic"},{"@pid":"41/2311","text":"Larry Greenstein"}]},"title":"EM-Based Channel Estimation from Crowd-Sourced RSSI Samples Corrupted by Noise and Interference.","venue":"CoRR","volume":"abs/1504.01072","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kokalj-Filipovic15","ee":"http://arxiv.org/abs/1504.01072","url":"https://dblp.org/rec/journals/corr/Kokalj-Filipovic15"}, "url":"URL#3679283" }, { "@score":"1", "@id":"3679284", "info":{"authors":{"author":{"@pid":"39/6691","text":"Natallia Kokash"}},"title":"Handshaking Protocol for Distributed Implementation of Reo.","venue":"CoRR","volume":"abs/1504.03553","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kokash15","ee":"http://arxiv.org/abs/1504.03553","url":"https://dblp.org/rec/journals/corr/Kokash15"}, "url":"URL#3679284" }, { "@score":"1", "@id":"3679285", "info":{"authors":{"author":[{"@pid":"154/6554","text":"Janne I. Kokkala"},{"@pid":"o/PatricRJOstergard","text":"Patric R. J. Östergård"}]},"title":"Further Results on the Classification of MDS Codes.","venue":"CoRR","volume":"abs/1504.06982","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KokkalaO15","ee":"http://arxiv.org/abs/1504.06982","url":"https://dblp.org/rec/journals/corr/KokkalaO15"}, "url":"URL#3679285" }, { "@score":"1", "@id":"3679292", "info":{"authors":{"author":[{"@pid":"75/11145","text":"Sudeshna Kolay"},{"@pid":"60/11535","text":"Fahad Panolan"}]},"title":"Parameterized Algorithms for Deletion to (r, l)-graphs.","venue":"CoRR","volume":"abs/1504.08120","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolayP15","ee":"http://arxiv.org/abs/1504.08120","url":"https://dblp.org/rec/journals/corr/KolayP15"}, "url":"URL#3679292" }, { "@score":"1", "@id":"3679298", "info":{"authors":{"author":[{"@pid":"137/6963-3","text":"Alexander Kolesnikov 0003"},{"@pid":"67/2136","text":"Christoph H. Lampert"}]},"title":"Identifying Reliable Annotations for Large Scale Image Segmentation.","venue":"CoRR","volume":"abs/1504.07460","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolesnikovL15","ee":"http://arxiv.org/abs/1504.07460","url":"https://dblp.org/rec/journals/corr/KolesnikovL15"}, "url":"URL#3679298" }, { "@score":"1", "@id":"3679307", "info":{"authors":{"author":[{"@pid":"89/3764","text":"Vladimir Kolmogorov"},{"@pid":"159/1618","text":"Michal Rolínek"},{"@pid":"49/2659","text":"Rustem Takhanov"}]},"title":"Effectiveness of Structural Restrictions for Hybrid CSPs.","venue":"CoRR","volume":"abs/1504.07067","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KolmogorovRT15","ee":"http://arxiv.org/abs/1504.07067","url":"https://dblp.org/rec/journals/corr/KolmogorovRT15"}, "url":"URL#3679307" }, { "@score":"1", "@id":"3679316", "info":{"authors":{"author":[{"@pid":"49/11433","text":"Ilan Komargodski"},{"@pid":"47/7934","text":"Pravesh Kothari"},{"@pid":"s/MadhuSudan","text":"Madhu Sudan 0001"}]},"title":"Communication with Contextual Uncertainty.","venue":"CoRR","volume":"abs/1504.04813","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KomargodskiKS15","ee":"http://arxiv.org/abs/1504.04813","url":"https://dblp.org/rec/journals/corr/KomargodskiKS15"}, "url":"URL#3679316" }, { "@score":"1", "@id":"3679332", "info":{"authors":{"author":[{"@pid":"139/0872","text":"Jakub Konecný"},{"@pid":"03/2134-36","text":"Jie Liu 0036"},{"@pid":"62/8001","text":"Peter Richtárik"},{"@pid":"42/3759-1","text":"Martin Takác 0001"}]},"title":"Mini-Batch Semi-Stochastic Gradient Descent in the Proximal Setting.","venue":"CoRR","volume":"abs/1504.04407","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KonecnyLRT15","ee":"http://arxiv.org/abs/1504.04407","url":"https://dblp.org/rec/journals/corr/KonecnyLRT15"}, "url":"URL#3679332" }, { "@score":"1", "@id":"3679346", "info":{"authors":{"author":[{"@pid":"k/StavrosKonstantinidis","text":"Stavros Konstantinidis"},{"@pid":"162/0238","text":"Casey Meijer"},{"@pid":"n/NelmaMoreira","text":"Nelma Moreira"},{"@pid":"30/5254","text":"Rogério Reis"}]},"title":"Symbolic Manipulation of Code Properties.","venue":"CoRR","volume":"abs/1504.04715","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KonstantinidisM15","ee":"http://arxiv.org/abs/1504.04715","url":"https://dblp.org/rec/journals/corr/KonstantinidisM15"}, "url":"URL#3679346" }, { "@score":"1", "@id":"3679360", "info":{"authors":{"author":[{"@pid":"131/6512","text":"Rob Koopman"},{"@pid":"19/6474","text":"Shenghui Wang 0001"},{"@pid":"02/1053","text":"Andrea Scharnhorst"}]},"title":"Contextualization of topics - browsing through terms, authors, journals and cluster allocations.","venue":"CoRR","volume":"abs/1504.04208","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoopmanWS15","ee":"http://arxiv.org/abs/1504.04208","url":"https://dblp.org/rec/journals/corr/KoopmanWS15"}, "url":"URL#3679360" }, { "@score":"1", "@id":"3679362", "info":{"authors":{"author":[{"@pid":"64/11189","text":"Farshad Kooti"},{"@pid":"61/5674","text":"Luca Maria Aiello"},{"@pid":"77/1208","text":"Mihajlo Grbovic"},{"@pid":"99/433","text":"Kristina Lerman"},{"@pid":"72/4569","text":"Amin Mantrach"}]},"title":"Evolution of Conversations in the Age of Email Overload.","venue":"CoRR","volume":"abs/1504.00704","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KootiAGLM15","ee":"http://arxiv.org/abs/1504.00704","url":"https://dblp.org/rec/journals/corr/KootiAGLM15"}, "url":"URL#3679362" }, { "@score":"1", "@id":"3679369", "info":{"authors":{"author":{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"}},"title":"Voice based self help System: User Experience Vs Accuracy.","venue":"CoRR","volume":"abs/1504.01496","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kopparapu15","ee":"http://arxiv.org/abs/1504.01496","url":"https://dblp.org/rec/journals/corr/Kopparapu15"}, "url":"URL#3679369" }, { "@score":"1", "@id":"3679370", "info":{"authors":{"author":[{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"},{"@pid":"162/0080","text":"Saurabh Bhatnagar"},{"@pid":"162/0141","text":"K. Sahana"},{"@pid":"162/0117","text":"Sathyanarayana"},{"@pid":"48/4277","text":"Akhilesh Srivastava"},{"@pid":"06/6668","text":"P. V. S. Rao"}]},"title":"A Metric to Classify Style of Spoken Speech.","venue":"CoRR","volume":"abs/1504.01427","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KopparapuBSSSR15","ee":"http://arxiv.org/abs/1504.01427","url":"https://dblp.org/rec/journals/corr/KopparapuBSSSR15"}, "url":"URL#3679370" }, { "@score":"1", "@id":"3679371", "info":{"authors":{"author":[{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"},{"@pid":"126/3454","text":"Devanuj"},{"@pid":"48/4277","text":"Akhilesh Srivastava"},{"@pid":"06/6668","text":"P. V. S. Rao"}]},"title":"Knowledge driven Offline to Online Script Conversion.","venue":"CoRR","volume":"abs/1504.01420","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KopparapuDSR15","ee":"http://arxiv.org/abs/1504.01420","url":"https://dblp.org/rec/journals/corr/KopparapuDSR15"}, "url":"URL#3679371" }, { "@score":"1", "@id":"3679372", "info":{"authors":{"author":[{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"},{"@pid":"153/1926","text":"Lajish V. L."}]},"title":"On-line Handwritten Devanagari Character Recognition using Fuzzy Directional Features.","venue":"CoRR","volume":"abs/1504.01488","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KopparapuL15","ee":"http://arxiv.org/abs/1504.01488","url":"https://dblp.org/rec/journals/corr/KopparapuL15"}, "url":"URL#3679372" }, { "@score":"1", "@id":"3679373", "info":{"authors":{"author":[{"@pid":"80/4866","text":"Swastik Kopparty"},{"@pid":"40/9185-1","text":"Mrinal Kumar 0001"},{"@pid":"s/MichaelESaks","text":"Michael E. Saks"}]},"title":"Efficient indexing of necklaces and irreducible polynomials over finite fields.","venue":"CoRR","volume":"abs/1504.00572","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kopparty0S15","ee":"http://arxiv.org/abs/1504.00572","url":"https://dblp.org/rec/journals/corr/Kopparty0S15"}, "url":"URL#3679373" }, { "@score":"1", "@id":"3679375", "info":{"authors":{"author":[{"@pid":"80/4866","text":"Swastik Kopparty"},{"@pid":"26/2656","text":"Or Meir"},{"@pid":"54/8727","text":"Noga Ron-Zewi"},{"@pid":"75/7249","text":"Shubhangi Saraf"}]},"title":"High rate locally-correctable and locally-testable codes with sub-polynomial query complexity.","venue":"CoRR","volume":"abs/1504.05653","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoppartyMRS15","ee":"http://arxiv.org/abs/1504.05653","url":"https://dblp.org/rec/journals/corr/KoppartyMRS15"}, "url":"URL#3679375" }, { "@score":"1", "@id":"3679392", "info":{"authors":{"author":[{"@pid":"161/9950","text":"Michaela Koscová"},{"@pid":"33/1341","text":"Ján Macutek"},{"@pid":"28/1044","text":"Emmerich Kelih"}]},"title":"A data-based classification of Slavic languages: Indices of qualitative variation applied to grapheme frequencies.","venue":"CoRR","volume":"abs/1504.03608","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoscovaMK15","ee":"http://arxiv.org/abs/1504.03608","url":"https://dblp.org/rec/journals/corr/KoscovaMK15"}, "url":"URL#3679392" }, { "@score":"1", "@id":"3679395", "info":{"authors":{"author":{"@pid":"130/4038","text":"Dmitry Kosolobov"}},"title":"Faster Lightweight Lempel-Ziv Parsing.","venue":"CoRR","volume":"abs/1504.06712","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kosolobov15","ee":"http://arxiv.org/abs/1504.06712","url":"https://dblp.org/rec/journals/corr/Kosolobov15"}, "url":"URL#3679395" }, { "@score":"1", "@id":"3679410", "info":{"authors":{"author":[{"@pid":"77/8774","text":"Robin Kothari"},{"@pid":"161/9783","text":"David Racicot-Desloges"},{"@pid":"18/3053","text":"Miklos Santha"}]},"title":"Separating decision tree complexity from subcube partition complexity.","venue":"CoRR","volume":"abs/1504.01339","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KothariRS15","ee":"http://arxiv.org/abs/1504.01339","url":"https://dblp.org/rec/journals/corr/KothariRS15"}, "url":"URL#3679410" }, { "@score":"1", "@id":"3679411", "info":{"authors":{"author":[{"@pid":"63/4977","text":"Wojciech Kotlowski"},{"@pid":"91/3569","text":"Krzysztof Dembczynski"}]},"title":"Surrogate regret bounds for generalized classification performance metrics.","venue":"CoRR","volume":"abs/1504.07272","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KotlowskiD15","ee":"http://arxiv.org/abs/1504.07272","url":"https://dblp.org/rec/journals/corr/KotlowskiD15"}, "url":"URL#3679411" }, { "@score":"1", "@id":"3679425", "info":{"authors":{"author":[{"@pid":"158/5101","text":"Fragkiskos Koufogiannis"},{"@pid":"20/7794-2","text":"Shuo Han 0002"},{"@pid":"p/GeorgeJPappas","text":"George J. Pappas"}]},"title":"Optimality of the Laplace Mechanism in Differential Privacy.","venue":"CoRR","volume":"abs/1504.00065","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoufogiannisHP15","ee":"http://arxiv.org/abs/1504.00065","url":"https://dblp.org/rec/journals/corr/KoufogiannisHP15"}, "url":"URL#3679425" }, { "@score":"1", "@id":"3679426", "info":{"authors":{"author":[{"@pid":"158/5101","text":"Fragkiskos Koufogiannis"},{"@pid":"20/7794-2","text":"Shuo Han 0002"},{"@pid":"p/GeorgeJPappas","text":"George J. Pappas"}]},"title":"Gradual Release of Sensitive Data under Differential Privacy.","venue":"CoRR","volume":"abs/1504.00429","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KoufogiannisHP15a","ee":"http://arxiv.org/abs/1504.00429","url":"https://dblp.org/rec/journals/corr/KoufogiannisHP15a"}, "url":"URL#3679426" }, { "@score":"1", "@id":"3679452", "info":{"authors":{"author":[{"@pid":"161/9885","text":"Mark Kozdoba"},{"@pid":"20/1669","text":"Shie Mannor"}]},"title":"Overlapping Communities Detection via Measure Space Embedding.","venue":"CoRR","volume":"abs/1504.06796","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KozdobaM15","ee":"http://arxiv.org/abs/1504.06796","url":"https://dblp.org/rec/journals/corr/KozdobaM15"}, "url":"URL#3679452" }, { "@score":"1", "@id":"3679453", "info":{"authors":{"author":[{"@pid":"161/9885","text":"Mark Kozdoba"},{"@pid":"20/1669","text":"Shie Mannor"}]},"title":"Overlapping Community Detection by Online Cluster Aggregation.","venue":"CoRR","volume":"abs/1504.06798","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KozdobaM15a","ee":"http://arxiv.org/abs/1504.06798","url":"https://dblp.org/rec/journals/corr/KozdobaM15a"}, "url":"URL#3679453" }, { "@score":"1", "@id":"3679473", "info":{"authors":{"author":[{"@pid":"161/9818","text":"Elisabeth Kraus"},{"@pid":"161/9995","text":"Simon D. Lentner"}]},"title":"Nash Equilibria And Partition Functions Of Games With Many Dependent Players.","venue":"CoRR","volume":"abs/1504.03965","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrausL15","ee":"http://arxiv.org/abs/1504.03965","url":"https://dblp.org/rec/journals/corr/KrausL15"}, "url":"URL#3679473" }, { "@score":"1", "@id":"3679478", "info":{"authors":{"author":[{"@pid":"162/0165","text":"Patrick Krauss"},{"@pid":"161/9874","text":"Claus Metzner"},{"@pid":"161/9957","text":"Konstantin Tziridis"},{"@pid":"05/2407","text":"Holger Schulze"}]},"title":"Adaptive stochastic resonance based on output autocorrelations.","venue":"CoRR","volume":"abs/1504.05032","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KraussMTS15","ee":"http://arxiv.org/abs/1504.05032","url":"https://dblp.org/rec/journals/corr/KraussMTS15"}, "url":"URL#3679478" }, { "@score":"1", "@id":"3679482", "info":{"authors":{"author":[{"@pid":"35/4442","text":"Andreas Krebs"},{"@pid":"38/5700","text":"Arne Meier"},{"@pid":"m/MMundhenk","text":"Martin Mundhenk"}]},"title":"The model checking fingerprints of CTL operators.","venue":"CoRR","volume":"abs/1504.04708","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrebsMM15","ee":"http://arxiv.org/abs/1504.04708","url":"https://dblp.org/rec/journals/corr/KrebsMM15"}, "url":"URL#3679482" }, { "@score":"1", "@id":"3679492", "info":{"authors":{"author":{"@pid":"125/5369","text":"Walid Krichene"}},"title":"Dual Averaging on Compactly-Supported Distributions And Application to No-Regret Learning on a Continuum.","venue":"CoRR","volume":"abs/1504.07720","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krichene15","ee":"http://arxiv.org/abs/1504.07720","url":"https://dblp.org/rec/journals/corr/Krichene15"}, "url":"URL#3679492" }, { "@score":"1", "@id":"3679510", "info":{"authors":{"author":[{"@pid":"71/10487","text":"Subhashini Krishnasamy"},{"@pid":"35/3902","text":"Urs Niesen"},{"@pid":"57/6295","text":"Piyush Gupta"}]},"title":"On the Scaling of Interference Alignment Under Delay and Power Constraints.","venue":"CoRR","volume":"abs/1504.03246","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnasamyNG15","ee":"http://arxiv.org/abs/1504.03246","url":"https://dblp.org/rec/journals/corr/KrishnasamyNG15"}, "url":"URL#3679510" }, { "@score":"1", "@id":"3679511", "info":{"authors":{"author":[{"@pid":"71/10487","text":"Subhashini Krishnasamy"},{"@pid":"135/1020","text":"Rajat Sen"},{"@pid":"80/4366","text":"Sewoong Oh"},{"@pid":"61/4596","text":"Sanjay Shakkottai"}]},"title":"Detecting Sponsored Recommendations.","venue":"CoRR","volume":"abs/1504.03713","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KrishnasamySOS15","ee":"http://arxiv.org/abs/1504.03713","url":"https://dblp.org/rec/journals/corr/KrishnasamySOS15"}, "url":"URL#3679511" }, { "@score":"1", "@id":"3679518", "info":{"authors":{"author":{"@pid":"120/7698","text":"Nikolai Krivulin"}},"title":"Rating alternatives from pairwise comparisons by solving tropical optimization problems.","venue":"CoRR","volume":"abs/1504.00800","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krivulin15c","ee":"http://arxiv.org/abs/1504.00800","url":"https://dblp.org/rec/journals/corr/Krivulin15c"}, "url":"URL#3679518" }, { "@score":"1", "@id":"3679519", "info":{"authors":{"author":{"@pid":"120/7698","text":"Nikolai Krivulin"}},"title":"Solving a tropical optimization problem via matrix sparsification.","venue":"CoRR","volume":"abs/1504.02602","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Krivulin15d","ee":"http://arxiv.org/abs/1504.02602","url":"https://dblp.org/rec/journals/corr/Krivulin15d"}, "url":"URL#3679519" }, { "@score":"1", "@id":"3679536", "info":{"authors":{"author":[{"@pid":"142/2664","text":"Yury Kryvasheyeu"},{"@pid":"142/2992","text":"Haohui Chen"},{"@pid":"162/0083","text":"Nick Obradovich"},{"@pid":"122/2977","text":"Esteban Moro Egido"},{"@pid":"h/PVHentenryck","text":"Pascal Van Hentenryck"},{"@pid":"80/5033","text":"James H. Fowler"},{"@pid":"c/ManuelCebrian","text":"Manuel Cebrián"}]},"title":"Nowcasting Disaster Damage.","venue":"CoRR","volume":"abs/1504.06827","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KryvasheyeuCOEH15","ee":"http://arxiv.org/abs/1504.06827","url":"https://dblp.org/rec/journals/corr/KryvasheyeuCOEH15"}, "url":"URL#3679536" }, { "@score":"1", "@id":"3679541", "info":{"authors":{"author":[{"@pid":"161/9779","text":"Ivo Kubjas"},{"@pid":"01/319","text":"Vitaly Skachek"}]},"title":"Data Dissemination Problem in Wireless Networks.","venue":"CoRR","volume":"abs/1504.00481","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KubjasS15","ee":"http://arxiv.org/abs/1504.00481","url":"https://dblp.org/rec/journals/corr/KubjasS15"}, "url":"URL#3679541" }, { "@score":"1", "@id":"3679545", "info":{"authors":{"author":[{"@pid":"k/GregoryKucherov","text":"Gregory Kucherov"},{"@pid":"152/3929","text":"Alexander Loptev"},{"@pid":"99/3746","text":"Tatiana Starikovskaya"}]},"title":"On Maximal Unbordered Factors.","venue":"CoRR","volume":"abs/1504.07406","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KucherovLS15","ee":"http://arxiv.org/abs/1504.07406","url":"https://dblp.org/rec/journals/corr/KucherovLS15"}, "url":"URL#3679545" }, { "@score":"1", "@id":"3679546", "info":{"authors":{"author":[{"@pid":"79/7512","text":"Dilek Küçük"},{"@pid":"64/7669","text":"Tolga Inan"},{"@pid":"162/0029","text":"Burak Boyrazoglu"},{"@pid":"133/5772","text":"Serkan Buhan"},{"@pid":"83/3695","text":"Özgül Salor"},{"@pid":"06/7444","text":"Isik Çadirci"},{"@pid":"67/7668","text":"Muammer Ermis"}]},"title":"PQStream: A Data Stream Architecture for Electrical Power Quality.","venue":"CoRR","volume":"abs/1504.04750","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KucukIBBSCE15","ee":"http://arxiv.org/abs/1504.04750","url":"https://dblp.org/rec/journals/corr/KucukIBBSCE15"}, "url":"URL#3679546" }, { "@score":"1", "@id":"3679549", "info":{"authors":{"author":[{"@pid":"79/7512","text":"Dilek Küçük"},{"@pid":"53/1392","text":"Meltem Turhan Yöndem"}]},"title":"A Knowledge-poor Pronoun Resolution System for Turkish.","venue":"CoRR","volume":"abs/1504.04751","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KucukY15","ee":"http://arxiv.org/abs/1504.04751","url":"https://dblp.org/rec/journals/corr/KucukY15"}, "url":"URL#3679549" }, { "@score":"1", "@id":"3679557", "info":{"authors":{"author":{"@pid":"85/5777","text":"Marco Kuhlmann"}},"title":"Tabulation of Noncrossing Acyclic Digraphs.","venue":"CoRR","volume":"abs/1504.04993","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Kuhlmann15","ee":"http://arxiv.org/abs/1504.04993","url":"https://dblp.org/rec/journals/corr/Kuhlmann15"}, "url":"URL#3679557" }, { "@score":"1", "@id":"3679562", "info":{"authors":{"author":[{"@pid":"162/0086","text":"Florian Kühnlenz"},{"@pid":"02/2072","text":"Pedro Henrique Juliano Nardelli"}]},"title":"Dynamics of Complex Systems Built as Coupled Physical, Communication and Decision Layers.","venue":"CoRR","volume":"abs/1504.04235","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KuhnlenzN15","ee":"http://arxiv.org/abs/1504.04235","url":"https://dblp.org/rec/journals/corr/KuhnlenzN15"}, "url":"URL#3679562" }, { "@score":"1", "@id":"3679590", "info":{"authors":{"author":[{"@pid":"02/9463","text":"Uday Kumar"},{"@pid":"157/8236","text":"Tuhin Borgohain"},{"@pid":"72/4268","text":"Sugata Sanyal"}]},"title":"Comparative Analysis of Cryptography Library in IoT.","venue":"CoRR","volume":"abs/1504.04306","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarBS15","ee":"http://arxiv.org/abs/1504.04306","url":"https://dblp.org/rec/journals/corr/KumarBS15"}, "url":"URL#3679590" }, { "@score":"1", "@id":"3679600", "info":{"authors":{"author":[{"@pid":"15/10327","text":"K. C. Amit Kumar"},{"@pid":"01/188","text":"Laurent Jacques"},{"@pid":"57/3965","text":"Christophe De Vleeschouwer"}]},"title":"Discriminative and Efficient Label Propagation on Complementary Graphs for Multi-Object Tracking.","venue":"CoRR","volume":"abs/1504.01124","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarJV15","ee":"http://arxiv.org/abs/1504.01124","url":"https://dblp.org/rec/journals/corr/KumarJV15"}, "url":"URL#3679600" }, { "@score":"1", "@id":"3679611", "info":{"authors":{"author":[{"@pid":"07/2616-3","text":"Santosh Kumar 0003"},{"@pid":"154/6152","text":"Gabriel Fernando Pivaro"},{"@pid":"57/4387","text":"Gustavo Fraidenraich"},{"@pid":"154/6202","text":"Claudio Ferreira Dias"}]},"title":"On the Exact and Approximate Eigenvalue Distribution for Sum of Wishart Matrices.","venue":"CoRR","volume":"abs/1504.00222","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KumarPFD15","ee":"http://arxiv.org/abs/1504.00222","url":"https://dblp.org/rec/journals/corr/KumarPFD15"}, "url":"URL#3679611" }, { "@score":"1", "@id":"3679637", "info":{"authors":{"author":[{"@pid":"71/11498","text":"Mayuresh Kunjir"},{"@pid":"161/9795","text":"Brandon Fain"},{"@pid":"m/KameshMunagala","text":"Kamesh Munagala"},{"@pid":"b/ShivnathBabu","text":"Shivnath Babu"}]},"title":"ROBUS: Fair Cache Allocation for Multi-tenant Data-parallel Workloads.","venue":"CoRR","volume":"abs/1504.06736","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KunjirFMB15","ee":"http://arxiv.org/abs/1504.06736","url":"https://dblp.org/rec/journals/corr/KunjirFMB15"}, "url":"URL#3679637" }, { "@score":"1", "@id":"3679647", "info":{"authors":{"author":[{"@pid":"162/0047","text":"David Burth Kurka"},{"@pid":"77/8047","text":"Alan Godoy"},{"@pid":"76/1954","text":"Fernando J. Von Zuben"}]},"title":"Online Social Network Analysis: A Survey of Research Applications in Computer Science.","venue":"CoRR","volume":"abs/1504.05655","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KurkaGZ15","ee":"http://arxiv.org/abs/1504.05655","url":"https://dblp.org/rec/journals/corr/KurkaGZ15"}, "url":"URL#3679647" }, { "@score":"1", "@id":"3679662", "info":{"authors":{"author":[{"@pid":"54/4387","text":"Andrey Kutuzov"},{"@pid":"161/9805","text":"Igor Andreev"}]},"title":"Texts in, meaning out: neural language models in semantic similarity task for Russian.","venue":"CoRR","volume":"abs/1504.08183","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KutuzovA15","ee":"http://arxiv.org/abs/1504.08183","url":"https://dblp.org/rec/journals/corr/KutuzovA15"}, "url":"URL#3679662" }, { "@score":"1", "@id":"3679675", "info":{"authors":{"author":[{"@pid":"78/2468","text":"Haewoon Kwak"},{"@pid":"12/8780","text":"Jeremy Blackburn"},{"@pid":"44/2111","text":"Seungyeop Han"}]},"title":"Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games.","venue":"CoRR","volume":"abs/1504.02305","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KwakBH15","ee":"http://arxiv.org/abs/1504.02305","url":"https://dblp.org/rec/journals/corr/KwakBH15"}, "url":"URL#3679675" }, { "@score":"1", "@id":"3679679", "info":{"authors":{"author":[{"@pid":"58/11142","text":"Tsz Chiu Kwok"},{"@pid":"l/LapChiLau","text":"Lap Chi Lau"},{"@pid":"125/2145","text":"Yin Tat Lee"}]},"title":"Improved Cheeger's Inequality and Analysis of Local Graph Partitioning using Vertex Expansion and Expansion Profile.","venue":"CoRR","volume":"abs/1504.00686","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/KwokLL15","ee":"http://arxiv.org/abs/1504.00686","url":"https://dblp.org/rec/journals/corr/KwokLL15"}, "url":"URL#3679679" }, { "@score":"1", "@id":"3679696", "info":{"authors":{"author":[{"@pid":"153/1926","text":"Lajish V. L."},{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"}]},"title":"Mobile Phone Based Vehicle License Plate Recognition for Road Policing.","venue":"CoRR","volume":"abs/1504.01476","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LK15a","ee":"http://arxiv.org/abs/1504.01476","url":"https://dblp.org/rec/journals/corr/LK15a"}, "url":"URL#3679696" }, { "@score":"1", "@id":"3679733", "info":{"authors":{"author":[{"@pid":"37/8655","text":"Ching-Yi Lai"},{"@pid":"74/315","text":"Runyao Duan"}]},"title":"On the One-Shot Zero-Error Classical Capacity of Classical-Quantum Channels Assisted by Quantum Non-signalling Correlations.","venue":"CoRR","volume":"abs/1504.06046","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LaiD15","ee":"http://arxiv.org/abs/1504.06046","url":"https://dblp.org/rec/journals/corr/LaiD15"}, "url":"URL#3679733" }, { "@score":"1", "@id":"3679737", "info":{"authors":{"author":[{"@pid":"31/9937","text":"Hanjiang Lai"},{"@pid":"88/3327","text":"Yan Pan"},{"@pid":"96/2615","text":"Ye Liu"},{"@pid":"y/ShuichengYan","text":"Shuicheng Yan"}]},"title":"Simultaneous Feature Learning and Hash Coding with Deep Neural Networks.","venue":"CoRR","volume":"abs/1504.03410","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LaiPLY15","ee":"http://arxiv.org/abs/1504.03410","url":"https://dblp.org/rec/journals/corr/LaiPLY15"}, "url":"URL#3679737" }, { "@score":"1", "@id":"3679743", "info":{"authors":{"author":[{"@pid":"10/7078","text":"Subhash Lakshminarayana"},{"@pid":"18/338","text":"Mohamad Assaad"},{"@pid":"75/4085","text":"Mérouane Debbah"}]},"title":"Coordinated Multi-cell Beamforming for Massive MIMO: A Random Matrix Approach.","venue":"CoRR","volume":"abs/1504.00434","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lakshminarayana15","ee":"http://arxiv.org/abs/1504.00434","url":"https://dblp.org/rec/journals/corr/Lakshminarayana15"}, "url":"URL#3679743" }, { "@score":"1", "@id":"3679746", "info":{"authors":{"author":[{"@pid":"130/3819","text":"Ramkumar Lakshminarayanan"},{"@pid":"162/0039","text":"Rajasekar Ramalingam"},{"@pid":"161/9931","text":"Shimaz Khan Shaik"}]},"title":"Challenges in transforming, engaging and improving m-learning in Higher Educational Institutions: Oman perspective.","venue":"CoRR","volume":"abs/1504.01139","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lakshminarayanan15a","ee":"http://arxiv.org/abs/1504.01139","url":"https://dblp.org/rec/journals/corr/Lakshminarayanan15a"}, "url":"URL#3679746" }, { "@score":"1", "@id":"3679767", "info":{"authors":{"author":[{"@pid":"161/9981","text":"N. K. Lampropoulos"},{"@pid":"307/5916","text":"Evangelos G. Karvelas"},{"@pid":"161/9865","text":"Ioannis E. Sarris"}]},"title":"Computational Modeling of an MRI Guided Drug Delivery System Based on Magnetic Nanoparticle Aggregations for the Navigation of Paramagnetic Nanocapsules.","venue":"CoRR","volume":"abs/1504.03490","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LampropoulosKS15","ee":"http://arxiv.org/abs/1504.03490","url":"https://dblp.org/rec/journals/corr/LampropoulosKS15"}, "url":"URL#3679767" }, { "@score":"1", "@id":"3679786", "info":{"authors":{"author":[{"@pid":"54/2884","text":"J. M. Landsberg"},{"@pid":"126/6944","text":"Mateusz Michalek"}]},"title":"Abelian Tensors.","venue":"CoRR","volume":"abs/1504.03732","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LandsbergM15","ee":"http://arxiv.org/abs/1504.03732","url":"https://dblp.org/rec/journals/corr/LandsbergM15"}, "url":"URL#3679786" }, { "@score":"1", "@id":"3679790", "info":{"authors":{"author":{"@pid":"94/11267","text":"Guangming Lang"}},"title":"Knowledge reduction of dynamic covering decision information systems with immigration of more objects.","venue":"CoRR","volume":"abs/1504.00136","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lang15a","ee":"http://arxiv.org/abs/1504.00136","url":"https://dblp.org/rec/journals/corr/Lang15a"}, "url":"URL#3679790" }, { "@score":"1", "@id":"3679820", "info":{"authors":{"author":[{"@pid":"87/10827","text":"Sina Lashgari"},{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"63/1946","text":"Salman Avestimehr"}]},"title":"MISO Broadcast Channel with Hybrid CSIT: Beyond Two Users.","venue":"CoRR","volume":"abs/1504.04615","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LashgariTA15","ee":"http://arxiv.org/abs/1504.04615","url":"https://dblp.org/rec/journals/corr/LashgariTA15"}, "url":"URL#3679820" }, { "@score":"1", "@id":"3679837", "info":{"authors":{"author":[{"@pid":"94/3960","text":"Monique Laurent"},{"@pid":"149/2422","text":"Matteo Seminaroti"}]},"title":"A Lex-BFS-based recognition algorithm for Robinsonian matrices.","venue":"CoRR","volume":"abs/1504.06586","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LaurentS15","ee":"http://arxiv.org/abs/1504.06586","url":"https://dblp.org/rec/journals/corr/LaurentS15"}, "url":"URL#3679837" }, { "@score":"1", "@id":"3679841", "info":{"authors":{"author":[{"@pid":"61/3205","text":"Massimo Lauria"},{"@pid":"88/3143","text":"Jakob Nordström"}]},"title":"Tight Size-Degree Bounds for Sums-of-Squares Proofs.","venue":"CoRR","volume":"abs/1504.01656","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LauriaN15","ee":"http://arxiv.org/abs/1504.01656","url":"https://dblp.org/rec/journals/corr/LauriaN15"}, "url":"URL#3679841" }, { "@score":"1", "@id":"3679856", "info":{"authors":{"author":[{"@pid":"l/SergeLawrencenko","text":"Serge Lawrencenko"},{"@pid":"161/9786","text":"Irina A. Duborkina"}]},"title":"Search algorithms for efficient logistics chains.","venue":"CoRR","volume":"abs/1504.03170","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LawrencenkoD15","ee":"http://arxiv.org/abs/1504.03170","url":"https://dblp.org/rec/journals/corr/LawrencenkoD15"}, "url":"URL#3679856" }, { "@score":"1", "@id":"3679859", "info":{"authors":{"author":{"@pid":"83/10757","text":"Glenn Lawyer"}},"title":"Stochasticity in pandemic spread over the World Airline Network explained by local flight connections.","venue":"CoRR","volume":"abs/1504.05743","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lawyer15","ee":"http://arxiv.org/abs/1504.05743","url":"https://dblp.org/rec/journals/corr/Lawyer15"}, "url":"URL#3679859" }, { "@score":"1", "@id":"3679864", "info":{"authors":{"author":[{"@pid":"161/9870","text":"Christphe Lazaro"},{"@pid":"73/4987","text":"Daniel Le Métayer"}]},"title":"The control over personal data: True remedy or fairy tale ?","venue":"CoRR","volume":"abs/1504.03877","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LazaroM15","ee":"http://arxiv.org/abs/1504.03877","url":"https://dblp.org/rec/journals/corr/LazaroM15"}, "url":"URL#3679864" }, { "@score":"1", "@id":"3679872", "info":{"authors":{"author":[{"@pid":"29/6166","text":"Quoc V. Le"},{"@pid":"04/6137","text":"Navdeep Jaitly"},{"@pid":"10/3248","text":"Geoffrey E. Hinton"}]},"title":"A Simple Way to Initialize Recurrent Networks of Rectified Linear Units.","venue":"CoRR","volume":"abs/1504.00941","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeJH15","ee":"http://arxiv.org/abs/1504.00941","url":"https://dblp.org/rec/journals/corr/LeJH15"}, "url":"URL#3679872" }, { "@score":"1", "@id":"3679882", "info":{"authors":{"author":[{"@pid":"70/803","text":"Phong Le"},{"@pid":"67/1016","text":"Willem H. Zuidema"}]},"title":"Unsupervised Dependency Parsing: Let's Use Supervised Parsers.","venue":"CoRR","volume":"abs/1504.04666","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeZ15a","ee":"http://arxiv.org/abs/1504.04666","url":"https://dblp.org/rec/journals/corr/LeZ15a"}, "url":"URL#3679882" }, { "@score":"1", "@id":"3679884", "info":{"authors":{"author":[{"@pid":"47/8483","text":"Laura Leal-Taixé"},{"@pid":"135/4914","text":"Anton Milan"},{"@pid":"r/IanDReid1","text":"Ian D. Reid 0001"},{"@pid":"24/3452","text":"Stefan Roth 0001"},{"@pid":"73/488","text":"Konrad Schindler"}]},"title":"MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking.","venue":"CoRR","volume":"abs/1504.01942","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Leal-TaixeMRRS15","ee":"http://arxiv.org/abs/1504.01942","url":"https://dblp.org/rec/journals/corr/Leal-TaixeMRRS15"}, "url":"URL#3679884" }, { "@score":"1", "@id":"3679908", "info":{"authors":{"author":[{"@pid":"04/656","text":"Chen-Yu Lee"},{"@pid":"00/1147","text":"Deng-Jyi Chen"}]},"title":"A Content Creation and Protection Scheme for Medical Images.","venue":"CoRR","volume":"abs/1504.03385","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeC15a","ee":"http://arxiv.org/abs/1504.03385","url":"https://dblp.org/rec/journals/corr/LeeC15a"}, "url":"URL#3679908" }, { "@score":"1", "@id":"3679918", "info":{"authors":{"author":[{"@pid":"199/2718","text":"Linda Naeun Lee"},{"@pid":"07/1108","text":"Serge Egelman"},{"@pid":"161/9810","text":"Joong Hwa Lee"},{"@pid":"42/5626","text":"David A. Wagner 0001"}]},"title":"Risk Perceptions for Wearable Devices.","venue":"CoRR","volume":"abs/1504.05694","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeELW15","ee":"http://arxiv.org/abs/1504.05694","url":"https://dblp.org/rec/journals/corr/LeeELW15"}, "url":"URL#3679918" }, { "@score":"1", "@id":"3679932", "info":{"authors":{"author":[{"@pid":"38/7864","text":"Si-Hyeon Lee"},{"@pid":"84/5679","text":"Ashish Khisti"}]},"title":"The Degraded Gaussian Diamond-Wiretap Channel.","venue":"CoRR","volume":"abs/1504.05900","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeK15","ee":"http://arxiv.org/abs/1504.05900","url":"https://dblp.org/rec/journals/corr/LeeK15"}, "url":"URL#3679932" }, { "@score":"1", "@id":"3679956", "info":{"authors":{"author":[{"@pid":"78/6080-1","text":"Jaeho Lee 0001"},{"@pid":"91/6905","text":"Maxim Raginsky"},{"@pid":"33/6665","text":"Pierre Moulin"}]},"title":"On MMSE estimation from quantized observations in the nonasymptotic regime.","venue":"CoRR","volume":"abs/1504.06029","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeeRM15","ee":"http://arxiv.org/abs/1504.06029","url":"https://dblp.org/rec/journals/corr/LeeRM15"}, "url":"URL#3679956" }, { "@score":"1", "@id":"3680004", "info":{"authors":{"author":[{"@pid":"57/721","text":"Sophie Lemaitre"},{"@pid":"150/6290","text":"Vladimir N. Salnikov"},{"@pid":"47/5368","text":"Daniel Choi"},{"@pid":"150/6327","text":"Philippe Karamian"}]},"title":"Computation of thermal properties via 3D homogenization of multiphase materials using FFT-based accelerated scheme.","venue":"CoRR","volume":"abs/1504.07499","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LemaitreSCK15","ee":"http://arxiv.org/abs/1504.07499","url":"https://dblp.org/rec/journals/corr/LemaitreSCK15"}, "url":"URL#3680004" }, { "@score":"1", "@id":"3680011", "info":{"authors":{"author":[{"@pid":"162/0125","text":"João S. Lemos"},{"@pid":"162/0185","text":"Francisco Rosário"},{"@pid":"91/10805","text":"Francisco A. Monteiro"},{"@pid":"04/4448","text":"João Xavier"},{"@pid":"01/5904","text":"António Rodrigues"}]},"title":"Massive MIMO Full-Duplex Relaying with Optimal Power Allocation for Independent Multipairs.","venue":"CoRR","volume":"abs/1504.06746","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LemosRMXR15","ee":"http://arxiv.org/abs/1504.06746","url":"https://dblp.org/rec/journals/corr/LemosRMXR15"}, "url":"URL#3680011" }, { "@score":"1", "@id":"3680014", "info":{"authors":{"author":{"@pid":"142/2896","text":"Shiyang Leng"}},"title":"Multi-Objective Power Allocation for Energy Efficient Wireless Information and Power Transfer Systems.","venue":"CoRR","volume":"abs/1504.02360","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Leng15","ee":"http://arxiv.org/abs/1504.02360","url":"https://dblp.org/rec/journals/corr/Leng15"}, "url":"URL#3680014" }, { "@score":"1", "@id":"3680018", "info":{"authors":{"author":[{"@pid":"144/2755","text":"Junyuan Leng"},{"@pid":"22/10734","text":"Yadong Zhou"},{"@pid":"99/6243-4","text":"Junjie Zhang 0004"},{"@pid":"62/921","text":"Chengchen Hu"}]},"title":"An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network.","venue":"CoRR","volume":"abs/1504.03095","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LengZZH15","ee":"http://arxiv.org/abs/1504.03095","url":"https://dblp.org/rec/journals/corr/LengZZH15"}, "url":"URL#3680018" }, { "@score":"1", "@id":"3680032", "info":{"authors":{"author":[{"@pid":"01/6820","text":"Pierre Leone"},{"@pid":"120/0920","text":"Kasun Samarasinghe"}]},"title":"Succint greedy routing without metric on planar triangulations.","venue":"CoRR","volume":"abs/1504.07377","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeoneS15","ee":"http://arxiv.org/abs/1504.07377","url":"https://dblp.org/rec/journals/corr/LeoneS15"}, "url":"URL#3680032" }, { "@score":"1", "@id":"3680056", "info":{"authors":{"author":[{"@pid":"24/10537","text":"Samantha Leung"},{"@pid":"35/9358","text":"Edward Lui"},{"@pid":"p/RPass","text":"Rafael Pass"}]},"title":"Stronger Impossibility Results for Strategy-Proof Voting with i.i.d. Beliefs.","venue":"CoRR","volume":"abs/1504.02514","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeungLP15","ee":"http://arxiv.org/abs/1504.02514","url":"https://dblp.org/rec/journals/corr/LeungLP15"}, "url":"URL#3680056" }, { "@score":"1", "@id":"3680062", "info":{"authors":{"author":[{"@pid":"52/6836","text":"Anthony Leverrier"},{"@pid":"53/7044","text":"Jean-Pierre Tillich"},{"@pid":"z/GZemor","text":"Gilles Zémor"}]},"title":"Quantum Expander Codes.","venue":"CoRR","volume":"abs/1504.00822","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LeverrierTZ15","ee":"http://arxiv.org/abs/1504.00822","url":"https://dblp.org/rec/journals/corr/LeverrierTZ15"}, "url":"URL#3680062" }, { "@score":"1", "@id":"3680076", "info":{"authors":{"author":[{"@pid":"162/0131","text":"Stanislav Levin"},{"@pid":"94/6661","text":"Amiram Yehudai"}]},"title":"Collaborative Real Time Coding or How to Avoid the Dreaded Merge.","venue":"CoRR","volume":"abs/1504.06741","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LevinY15","ee":"http://arxiv.org/abs/1504.06741","url":"https://dblp.org/rec/journals/corr/LevinY15"}, "url":"URL#3680076" }, { "@score":"1", "@id":"3680077", "info":{"authors":{"author":[{"@pid":"162/0131","text":"Stanislav Levin"},{"@pid":"94/6661","text":"Amiram Yehudai"}]},"title":"Improving software team collaboration with Synchronized Software Development.","venue":"CoRR","volume":"abs/1504.06742","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LevinY15a","ee":"http://arxiv.org/abs/1504.06742","url":"https://dblp.org/rec/journals/corr/LevinY15a"}, "url":"URL#3680077" }, { "@score":"1", "@id":"3680079", "info":{"authors":{"author":[{"@pid":"80/7594","text":"Sergey Levine"},{"@pid":"131/1783","text":"Chelsea Finn"},{"@pid":"d/TrevorDarrell","text":"Trevor Darrell"},{"@pid":"a/PieterAbbeel","text":"Pieter Abbeel"}]},"title":"End-to-End Training of Deep Visuomotor Policies.","venue":"CoRR","volume":"abs/1504.00702","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LevineFDA15","ee":"http://arxiv.org/abs/1504.00702","url":"https://dblp.org/rec/journals/corr/LevineFDA15"}, "url":"URL#3680079" }, { "@score":"1", "@id":"3680080", "info":{"authors":{"author":[{"@pid":"162/0164","text":"Nir Levine"},{"@pid":"217/3322","text":"Timothy A. Mann"},{"@pid":"20/1669","text":"Shie Mannor"}]},"title":"Actively Learning to Attract Followers on Twitter.","venue":"CoRR","volume":"abs/1504.04114","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LevineMM15","ee":"http://arxiv.org/abs/1504.04114","url":"https://dblp.org/rec/journals/corr/LevineMM15"}, "url":"URL#3680080" }, { "@score":"1", "@id":"3680096", "info":{"authors":{"author":{"@pid":"18/5038","text":"Loet Leydesdorff"}},"title":"Can the Intellectual Processes in Science Also Be Simulated? The Anticipation and Visualization of Possible Future States.","venue":"CoRR","volume":"abs/1504.04801","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Leydesdorff15b","ee":"http://arxiv.org/abs/1504.04801","url":"https://dblp.org/rec/journals/corr/Leydesdorff15b"}, "url":"URL#3680096" }, { "@score":"1", "@id":"3680114", "info":{"authors":{"author":{"@pid":"74/4263","text":"Quan-Lin Li"}},"title":"Nonlinear Markov Processes in Big Networks.","venue":"CoRR","volume":"abs/1504.07974","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Li15g","ee":"http://arxiv.org/abs/1504.07974","url":"https://dblp.org/rec/journals/corr/Li15g"}, "url":"URL#3680114" }, { "@score":"1", "@id":"3680115", "info":{"authors":{"author":{"@pid":"62/5860-1","text":"Ping Li 0001"}},"title":"Sign Stable Random Projections for Large-Scale Learning.","venue":"CoRR","volume":"abs/1504.07235","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Li15h","ee":"http://arxiv.org/abs/1504.07235","url":"https://dblp.org/rec/journals/corr/Li15h"}, "url":"URL#3680115" }, { "@score":"1", "@id":"3680129", "info":{"authors":{"author":[{"@pid":"77/8278","text":"Piji Li"},{"@pid":"53/6625","text":"Lidong Bing"},{"@pid":"48/1707","text":"Wai Lam"},{"@pid":"83/5560","text":"Hang Li"},{"@pid":"51/3646","text":"Yi Liao"}]},"title":"Reader-Aware Multi-Document Summarization via Sparse Coding.","venue":"CoRR","volume":"abs/1504.07324","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiBLLL15","ee":"http://arxiv.org/abs/1504.07324","url":"https://dblp.org/rec/journals/corr/LiBLLL15"}, "url":"URL#3680129" }, { "@score":"1", "@id":"3680137", "info":{"authors":{"author":[{"@pid":"133/0283-3","text":"Yuanxin Li 0003"},{"@pid":"82/8759","text":"Yuejie Chi"}]},"title":"Super-Resolution of Mutually Interfering Signals.","venue":"CoRR","volume":"abs/1504.06015","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiC15","ee":"http://arxiv.org/abs/1504.06015","url":"https://dblp.org/rec/journals/corr/LiC15"}, "url":"URL#3680137" }, { "@score":"1", "@id":"3680196", "info":{"authors":{"author":[{"@pid":"119/2630","text":"Songze Li"},{"@pid":"146/0779","text":"David T. H. Kao"},{"@pid":"63/1946","text":"Amir Salman Avestimehr"}]},"title":"Rover-to-Orbiter Communication in Mars: Taking Advantage of the Varying Topology.","venue":"CoRR","volume":"abs/1504.04797","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiKA15","ee":"http://arxiv.org/abs/1504.04797","url":"https://dblp.org/rec/journals/corr/LiKA15"}, "url":"URL#3680196" }, { "@score":"1", "@id":"3680209", "info":{"authors":{"author":[{"@pid":"74/6136","text":"Xiangru Li"},{"@pid":"09/2321","text":"Yu Lu"},{"@pid":"161/9934","text":"Georges Comte"},{"@pid":"173/9187","text":"Ali Luo"},{"@pid":"84/6369","text":"Yongheng Zhao"},{"@pid":"74/1097","text":"Yongjun Wang"}]},"title":"Linearly Supporting Feature Extraction For Automated Estimation Of Stellar Atmospheric Parameters.","venue":"CoRR","volume":"abs/1504.02164","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLCLZW15","ee":"http://arxiv.org/abs/1504.02164","url":"https://dblp.org/rec/journals/corr/LiLCLZW15"}, "url":"URL#3680209" }, { "@score":"1", "@id":"3680214", "info":{"authors":{"author":[{"@pid":"36/3071","text":"Xiaoming Li"},{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"49/8497","text":"Jinxing Hu"},{"@pid":"18/7217","text":"Baoyun Zhang"},{"@pid":"54/7017","text":"Ling Yin"},{"@pid":"98/10416","text":"Chen Zhong"},{"@pid":"161/9929","text":"Weixi Wang"},{"@pid":"96/6099","text":"Shengzhong Feng"}]},"title":"Traffic Management and Forecasting System Based on 3D GIS.","venue":"CoRR","volume":"abs/1504.01375","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLHZYZWF15","ee":"http://arxiv.org/abs/1504.01375","url":"https://dblp.org/rec/journals/corr/LiLHZYZWF15"}, "url":"URL#3680214" }, { "@score":"1", "@id":"3680230", "info":{"authors":{"author":[{"@pid":"74/4330-1","text":"Xuhui Li 0001"},{"@pid":"l/MengchiLiu","text":"Mengchi Liu"},{"@pid":"79/1083","text":"Xiaoying Wu"},{"@pid":"20/6446","text":"Shanfeng Zhu"}]},"title":"Design Issues of JPQ: a Pattern-based Query Language for Document Databases.","venue":"CoRR","volume":"abs/1504.03770","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLWZ15","ee":"http://arxiv.org/abs/1504.03770","url":"https://dblp.org/rec/journals/corr/LiLWZ15"}, "url":"URL#3680230" }, { "@score":"1", "@id":"3680237", "info":{"authors":{"author":[{"@pid":"36/3071","text":"Xiaoming Li"},{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"18/7217","text":"Baoyun Zhang"},{"@pid":"161/9929","text":"Weixi Wang"},{"@pid":"96/6099","text":"Shengzhong Feng"},{"@pid":"49/8497","text":"Jinxing Hu"}]},"title":"WebVRGIS Based City Bigdata 3D Visualization and Analysis.","venue":"CoRR","volume":"abs/1504.01051","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiLZWFH15","ee":"http://arxiv.org/abs/1504.01051","url":"https://dblp.org/rec/journals/corr/LiLZWFH15"}, "url":"URL#3680237" }, { "@score":"1", "@id":"3680251", "info":{"authors":{"author":[{"@pid":"55/2162-4","text":"Fang Li 0004"},{"@pid":"24/5359","text":"Stanley J. Osher"},{"@pid":"00/1015-3","text":"Jing Qin 0003"},{"@pid":"51/5332-6","text":"Ming Yan 0006"}]},"title":"A Multiphase Image Segmentation Based on Fuzzy Membership Functions and L1-norm Fidelity.","venue":"CoRR","volume":"abs/1504.02206","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiOQY15","ee":"http://arxiv.org/abs/1504.02206","url":"https://dblp.org/rec/journals/corr/LiOQY15"}, "url":"URL#3680251" }, { "@score":"1", "@id":"3680267", "info":{"authors":{"author":[{"@pid":"33/5448-15","text":"Jian Li 0015"},{"@pid":"r/YRabani","text":"Yuval Rabani"},{"@pid":"53/4745","text":"Leonard J. Schulman"},{"@pid":"99/662","text":"Chaitanya Swamy"}]},"title":"Learning Arbitrary Statistical Mixtures of Discrete Distributions.","venue":"CoRR","volume":"abs/1504.02526","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiRSS15a","ee":"http://arxiv.org/abs/1504.02526","url":"https://dblp.org/rec/journals/corr/LiRSS15a"}, "url":"URL#3680267" }, { "@score":"1", "@id":"3680287", "info":{"authors":{"author":[{"@pid":"126/0713","text":"Liangyue Li"},{"@pid":"58/1757","text":"Hanghang Tong"}]},"title":"The Child is Father of the Man: Foresee the Success at the Early Stage.","venue":"CoRR","volume":"abs/1504.00948","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiT15a","ee":"http://arxiv.org/abs/1504.00948","url":"https://dblp.org/rec/journals/corr/LiT15a"}, "url":"URL#3680287" }, { "@score":"1", "@id":"3680291", "info":{"authors":{"author":[{"@pid":"74/2397-3","text":"Zhen Li 0003"},{"@pid":"137/8216","text":"Yu-Hang Tang"},{"@pid":"145/2501","text":"Xuejin Li"},{"@pid":"16/1153","text":"George E. Karniadakis"}]},"title":"Mesoscale modeling of phase transition dynamics of thermoresponsive polymers.","venue":"CoRR","volume":"abs/1504.07094","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiTLK15","ee":"http://arxiv.org/abs/1504.07094","url":"https://dblp.org/rec/journals/corr/LiTLK15"}, "url":"URL#3680291" }, { "@score":"1", "@id":"3680330", "info":{"authors":{"author":[{"@pid":"74/4263","text":"Quan-Lin Li"},{"@pid":"98/9818","text":"Feifei Yang"},{"@pid":"18/3173","text":"Na Li"}]},"title":"Reward Processes and Performance Simulation in Supermarket Models with Different Servers.","venue":"CoRR","volume":"abs/1504.08150","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiYL15","ee":"http://arxiv.org/abs/1504.08150","url":"https://dblp.org/rec/journals/corr/LiYL15"}, "url":"URL#3680330" }, { "@score":"1", "@id":"3680339", "info":{"authors":{"author":[{"@pid":"54/6850","text":"Liping Li"},{"@pid":"47/2917","text":"Wenyi Zhang"},{"@pid":"78/2575","text":"Yanjun Hu"}]},"title":"On the Error Performance of Systematic Polar Codes.","venue":"CoRR","volume":"abs/1504.04133","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZH15","ee":"http://arxiv.org/abs/1504.04133","url":"https://dblp.org/rec/journals/corr/LiZH15"}, "url":"URL#3680339" }, { "@score":"1", "@id":"3680344", "info":{"authors":{"author":[{"@pid":"161/9965","text":"Chongxuan Li"},{"@pid":"50/2644-1","text":"Jun Zhu 0001"},{"@pid":"127/7561","text":"Tianlin Shi"},{"@pid":"36/2259-10","text":"Bo Zhang 0010"}]},"title":"Max-margin Deep Generative Models.","venue":"CoRR","volume":"abs/1504.06787","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiZSZ15","ee":"http://arxiv.org/abs/1504.06787","url":"https://dblp.org/rec/journals/corr/LiZSZ15"}, "url":"URL#3680344" }, { "@score":"1", "@id":"3680371", "info":{"authors":{"author":[{"@pid":"73/2796","text":"Ning Liang"},{"@pid":"47/2917-1","text":"Wenyi Zhang 0001"}]},"title":"Mixed-ADC Massive MIMO.","venue":"CoRR","volume":"abs/1504.03516","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiangZ15","ee":"http://arxiv.org/abs/1504.03516","url":"https://dblp.org/rec/journals/corr/LiangZ15"}, "url":"URL#3680371" }, { "@score":"1", "@id":"3680374", "info":{"authors":{"author":[{"@pid":"91/10131","text":"Yun Liao"},{"@pid":"87/2334","text":"Kaigui Bian"},{"@pid":"02/2683","text":"Lingyang Song"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Full-duplex MAC Protocol Design and Analysis.","venue":"CoRR","volume":"abs/1504.06957","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiaoBSH15","ee":"http://arxiv.org/abs/1504.06957","url":"https://dblp.org/rec/journals/corr/LiaoBSH15"}, "url":"URL#3680374" }, { "@score":"1", "@id":"3680415", "info":{"authors":{"author":[{"@pid":"08/7434","text":"Antonio Lima"},{"@pid":"40/8912","text":"Veljko Pejovic"},{"@pid":"61/7974-4","text":"Luca Rossi 0004"},{"@pid":"54/5541","text":"Mirco Musolesi"},{"@pid":"12/8911","text":"Marta C. González"}]},"title":"Progmosis: Evaluating Risky Individual Behavior During Epidemics Using Mobile Network Data.","venue":"CoRR","volume":"abs/1504.01316","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LimaP0MG15","ee":"http://arxiv.org/abs/1504.01316","url":"https://dblp.org/rec/journals/corr/LimaP0MG15"}, "url":"URL#3680415" }, { "@score":"1", "@id":"3680418", "info":{"authors":{"author":[{"@pid":"55/8612","text":"Steffen Limmer"},{"@pid":"92/8969","text":"Jafar Mohammadi"},{"@pid":"s/SlawomirStanczak","text":"Slawomir Stanczak"}]},"title":"A Simple Algorithm for Approximation by Nomographic Functions.","venue":"CoRR","volume":"abs/1504.05474","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LimmerMS15","ee":"http://arxiv.org/abs/1504.05474","url":"https://dblp.org/rec/journals/corr/LimmerMS15"}, "url":"URL#3680418" }, { "@score":"1", "@id":"3680435", "info":{"authors":{"author":[{"@pid":"04/3743","text":"Jian-Hong Lin"},{"@pid":"72/1985","text":"Qiang Guo"},{"@pid":"66/3169","text":"Jian-Guo Liu"},{"@pid":"98/4450-1","text":"Tao Zhou 0001"}]},"title":"Locating influential nodes via dynamics-sensitive centrality.","venue":"CoRR","volume":"abs/1504.06672","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinGLZ15","ee":"http://arxiv.org/abs/1504.06672","url":"https://dblp.org/rec/journals/corr/LinGLZ15"}, "url":"URL#3680435" }, { "@score":"1", "@id":"3680442", "info":{"authors":{"author":[{"@pid":"37/3545","text":"Hui Lin"},{"@pid":"154/6617","text":"Jianbiao Lin"},{"@pid":"145/1166","text":"Ke Ji"},{"@pid":"162/0108","text":"Jingjie Wang"},{"@pid":"75/2611","text":"Feng Lin"}]},"title":"Promote the Industry Standard of Smart Home in China by Intelligent Router Technology.","venue":"CoRR","volume":"abs/1504.03912","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinLJWL15","ee":"http://arxiv.org/abs/1504.03912","url":"https://dblp.org/rec/journals/corr/LinLJWL15"}, "url":"URL#3680442" }, { "@score":"1", "@id":"3680461", "info":{"authors":{"author":[{"@pid":"37/9004","text":"Tsung-Yu Lin"},{"@pid":"94/11341","text":"Aruni RoyChowdhury"},{"@pid":"92/6598","text":"Subhransu Maji"}]},"title":"Bilinear CNN Models for Fine-grained Visual Recognition.","venue":"CoRR","volume":"abs/1504.07889","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinRM15a","ee":"http://arxiv.org/abs/1504.07889","url":"https://dblp.org/rec/journals/corr/LinRM15a"}, "url":"URL#3680461" }, { "@score":"1", "@id":"3680465", "info":{"authors":{"author":[{"@pid":"126/4778","text":"Guosheng Lin"},{"@pid":"56/1673","text":"Chunhua Shen"},{"@pid":"r/IanDReid1","text":"Ian D. Reid 0001"},{"@pid":"v/AntonvandenHengel","text":"Anton van den Hengel"}]},"title":"Efficient piecewise training of deep structured models for semantic segmentation.","venue":"CoRR","volume":"abs/1504.01013","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinSRH15","ee":"http://arxiv.org/abs/1504.01013","url":"https://dblp.org/rec/journals/corr/LinSRH15"}, "url":"URL#3680465" }, { "@score":"1", "@id":"3680468", "info":{"authors":{"author":[{"@pid":"162/0159","text":"Jinbiao Lin"},{"@pid":"72/5351","text":"Shiji Song"},{"@pid":"55/8132","text":"Keyou You"},{"@pid":"49/3738","text":"Cheng Wu"}]},"title":"3-D Velocity Regulation for Nonholonomic Source Seeking Without Position Measurement.","venue":"CoRR","volume":"abs/1504.06461","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinSYW15","ee":"http://arxiv.org/abs/1504.06461","url":"https://dblp.org/rec/journals/corr/LinSYW15"}, "url":"URL#3680468" }, { "@score":"1", "@id":"3680474", "info":{"authors":{"author":[{"@pid":"31/1246","text":"Shih-Chun Lin"},{"@pid":"90/7254","text":"I-Hsiang Wang"}]},"title":"On Two-Pair Two-Way Relay Channel with an Intermittently Available Relay.","venue":"CoRR","volume":"abs/1504.05679","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LinW15","ee":"http://arxiv.org/abs/1504.05679","url":"https://dblp.org/rec/journals/corr/LinW15"}, "url":"URL#3680474" }, { "@score":"1", "@id":"3680488", "info":{"authors":{"author":{"@pid":"33/1119","text":"Tony Lindeberg"}},"title":"Separable time-causal and time-recursive spatio-temporal receptive fields.","venue":"CoRR","volume":"abs/1504.01502","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lindeberg15","ee":"http://arxiv.org/abs/1504.01502","url":"https://dblp.org/rec/journals/corr/Lindeberg15"}, "url":"URL#3680488" }, { "@score":"1", "@id":"3680489", "info":{"authors":{"author":{"@pid":"33/1119","text":"Tony Lindeberg"}},"title":"Time-causal and time-recursive spatio-temporal receptive fields.","venue":"CoRR","volume":"abs/1504.02648","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lindeberg15a","ee":"http://arxiv.org/abs/1504.02648","url":"https://dblp.org/rec/journals/corr/Lindeberg15a"}, "url":"URL#3680489" }, { "@score":"1", "@id":"3680518", "info":{"authors":{"author":[{"@pid":"157/8381","text":"M. M. S. Lira"},{"@pid":"130/6194","text":"Hélio M. de Oliveira"},{"@pid":"51/7601","text":"Renato J. Cintra"},{"@pid":"21/8761","text":"Ricardo M. Campello de Souza"}]},"title":"Wavelets for Elliptical Waveguide Problems.","venue":"CoRR","volume":"abs/1504.05262","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiraOCS15a","ee":"http://arxiv.org/abs/1504.05262","url":"https://dblp.org/rec/journals/corr/LiraOCS15a"}, "url":"URL#3680518" }, { "@score":"1", "@id":"3680523", "info":{"authors":{"author":{"@pid":"21/1732","text":"John B. Little"}},"title":"Toric Codes and Finite Geometries.","venue":"CoRR","volume":"abs/1504.07494","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Little15","ee":"http://arxiv.org/abs/1504.07494","url":"https://dblp.org/rec/journals/corr/Little15"}, "url":"URL#3680523" }, { "@score":"1", "@id":"3680528", "info":{"authors":{"author":{"@pid":"77/1318","text":"Feng Liu"}},"title":"Definition and Research of Internet Neurology.","venue":"CoRR","volume":"abs/1504.02842","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Liu15b","ee":"http://arxiv.org/abs/1504.02842","url":"https://dblp.org/rec/journals/corr/Liu15b"}, "url":"URL#3680528" }, { "@score":"1", "@id":"3680529", "info":{"authors":{"author":{"@pid":"49/3283-1","text":"Wei Liu 0001"}},"title":"Antenna Array Signal Processing for Quaternion-Valued Wireless Communication Systems.","venue":"CoRR","volume":"abs/1504.02921","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Liu15c","ee":"http://arxiv.org/abs/1504.02921","url":"https://dblp.org/rec/journals/corr/Liu15c"}, "url":"URL#3680529" }, { "@score":"1", "@id":"3680552", "info":{"authors":{"author":[{"@pid":"43/7726","text":"Jingbo Liu"},{"@pid":"117/8945","text":"Paul W. Cuff"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"One-Shot Mutual Covering Lemma and Marton's Inner Bound with a Common Message.","venue":"CoRR","volume":"abs/1504.04092","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuCV15","ee":"http://arxiv.org/abs/1504.04092","url":"https://dblp.org/rec/journals/corr/LiuCV15"}, "url":"URL#3680552" }, { "@score":"1", "@id":"3680553", "info":{"authors":{"author":[{"@pid":"43/7726","text":"Jingbo Liu"},{"@pid":"117/8945","text":"Paul W. Cuff"},{"@pid":"v/SVerdu","text":"Sergio Verdú"}]},"title":"Secret Key Generation with One Communicator and a One-Shot Converse via Hypercontractivity.","venue":"CoRR","volume":"abs/1504.05526","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuCV15a","ee":"http://arxiv.org/abs/1504.05526","url":"https://dblp.org/rec/journals/corr/LiuCV15a"}, "url":"URL#3680553" }, { "@score":"1", "@id":"3680556", "info":{"authors":{"author":[{"@pid":"58/6609","text":"Shuang Liu"},{"@pid":"10/217-15","text":"Cheng Chen 0015"},{"@pid":"52/5331","text":"Zhihua Zhang"}]},"title":"Distributed Multi-Armed Bandits: Regret vs. Communication.","venue":"CoRR","volume":"abs/1504.03509","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuCZ15","ee":"http://arxiv.org/abs/1504.03509","url":"https://dblp.org/rec/journals/corr/LiuCZ15"}, "url":"URL#3680556" }, { "@score":"1", "@id":"3680571", "info":{"authors":{"author":[{"@pid":"20/303-1","text":"Jianming Liu 0001"},{"@pid":"20/4964","text":"Steven L. Grant"}]},"title":"An Improved Variable Step-size Zero-point Attracting Projection Algorithm.","venue":"CoRR","volume":"abs/1504.03664","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuG15","ee":"http://arxiv.org/abs/1504.03664","url":"https://dblp.org/rec/journals/corr/LiuG15"}, "url":"URL#3680571" }, { "@score":"1", "@id":"3680577", "info":{"authors":{"author":[{"@pid":"05/10488","text":"Qingzhi Liu"},{"@pid":"71/4611","text":"Michal Golinski"},{"@pid":"29/1584","text":"Przemyslaw Pawelczak"},{"@pid":"96/4299","text":"Martijn Warnier"}]},"title":"Green Wireless Power Transfer Networks.","venue":"CoRR","volume":"abs/1504.00639","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuGPW15","ee":"http://arxiv.org/abs/1504.00639","url":"https://dblp.org/rec/journals/corr/LiuGPW15"}, "url":"URL#3680577" }, { "@score":"1", "@id":"3680579", "info":{"authors":{"author":[{"@pid":"156/1219","text":"Beiyi Liu"},{"@pid":"16/8146","text":"Guan Gui 0001"},{"@pid":"85/2168-4","text":"Li Xu 0004"}]},"title":"Iterative-Promoting Variable Step-size Least Mean Square Algorithm For Adaptive Sparse Channel Estimation.","venue":"CoRR","volume":"abs/1504.03077","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuGX15","ee":"http://arxiv.org/abs/1504.03077","url":"https://dblp.org/rec/journals/corr/LiuGX15"}, "url":"URL#3680579" }, { "@score":"1", "@id":"3680581", "info":{"authors":{"author":[{"@pid":"33/9282","text":"Haijing Liu"},{"@pid":"46/5223-1","text":"Hui Gao 0001"},{"@pid":"03/10239","text":"Shaoshi Yang"},{"@pid":"77/4591","text":"Tiejun Lv"}]},"title":"Low-Complexity Downlink User Selection for Massive MIMO Systems.","venue":"CoRR","volume":"abs/1504.02990","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuGYL15","ee":"http://arxiv.org/abs/1504.02990","url":"https://dblp.org/rec/journals/corr/LiuGYL15"}, "url":"URL#3680581" }, { "@score":"1", "@id":"3680585", "info":{"authors":{"author":[{"@pid":"16/8970","text":"Lanchao Liu"},{"@pid":"83/514","text":"Zhu Han 0001"}]},"title":"Multi-Block ADMM for Big Data Optimization in Modern Communication Networks.","venue":"CoRR","volume":"abs/1504.01809","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuH15c","ee":"http://arxiv.org/abs/1504.01809","url":"https://dblp.org/rec/journals/corr/LiuH15c"}, "url":"URL#3680585" }, { "@score":"1", "@id":"3680597", "info":{"authors":{"author":[{"@pid":"75/1219","text":"Hongwu Liu"},{"@pid":"48/1338","text":"Kyeong Jin Kim"},{"@pid":"61/4074","text":"Kyung Sup Kwak"}]},"title":"Power Splitting for Full-Duplex Relay with Wireless Information and Power Transfer.","venue":"CoRR","volume":"abs/1504.04697","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuKK15","ee":"http://arxiv.org/abs/1504.04697","url":"https://dblp.org/rec/journals/corr/LiuKK15"}, "url":"URL#3680597" }, { "@score":"1", "@id":"3680612", "info":{"authors":{"author":[{"@pid":"51/3710-17","text":"Yang Liu 0017"},{"@pid":"l/TiffanyJingLi","text":"Tiffany Jing Li"},{"@pid":"119/2637","text":"Xuanxuan Lu"}]},"title":"Joint Transceiver Design for Oversampling or Cluster-Based Wireless Sensor Network.","venue":"CoRR","volume":"abs/1504.05311","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuLL15a","ee":"http://arxiv.org/abs/1504.05311","url":"https://dblp.org/rec/journals/corr/LiuLL15a"}, "url":"URL#3680612" }, { "@score":"1", "@id":"3680614", "info":{"authors":{"author":[{"@pid":"60/7642","text":"Si Liu 0001"},{"@pid":"136/0900","text":"Xiaodan Liang"},{"@pid":"29/8842","text":"Luoqi Liu"},{"@pid":"88/6582","text":"Xiaohui Shen"},{"@pid":"96/3835","text":"Jianchao Yang"},{"@pid":"85/1301","text":"Changsheng Xu"},{"@pid":"84/7019","text":"Liang Lin"},{"@pid":"39/3695","text":"Xiaochun Cao"},{"@pid":"y/ShuichengYan","text":"Shuicheng Yan"}]},"title":"Matching-CNN Meets KNN: Quasi-Parametric Human Parsing.","venue":"CoRR","volume":"abs/1504.01220","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuLLSYXLCY15","ee":"http://arxiv.org/abs/1504.01220","url":"https://dblp.org/rec/journals/corr/LiuLLSYXLCY15"}, "url":"URL#3680614" }, { "@score":"1", "@id":"3680636", "info":{"authors":{"author":[{"@pid":"77/1318-30","text":"Feng Liu 0030"},{"@pid":"84/5467-1","text":"Yong Shi 0001"}]},"title":"Quantitative Analysis of Whether Machine Intelligence Can Surpass Human Intelligence.","venue":"CoRR","volume":"abs/1504.02882","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuS15","ee":"http://arxiv.org/abs/1504.02882","url":"https://dblp.org/rec/journals/corr/LiuS15"}, "url":"URL#3680636" }, { "@score":"1", "@id":"3680650", "info":{"authors":{"author":[{"@pid":"04/5600","text":"Wanwei Liu"},{"@pid":"76/893","text":"Lei Song"},{"@pid":"64/856-1","text":"Ji Wang 0001"},{"@pid":"76/4015-1","text":"Lijun Zhang 0001"}]},"title":"A Simple Probabilistic Extension of Modal Mu-calculus.","venue":"CoRR","volume":"abs/1504.07737","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuSWZ15","ee":"http://arxiv.org/abs/1504.07737","url":"https://dblp.org/rec/journals/corr/LiuSWZ15"}, "url":"URL#3680650" }, { "@score":"1", "@id":"3680700", "info":{"authors":{"author":[{"@pid":"95/1247","text":"Qingshan Liu 0001"},{"@pid":"62/5839-11","text":"Jing Yang 0011"},{"@pid":"84/8017","text":"Kaihua Zhang"},{"@pid":"44/3684-1","text":"Yi Wu 0001"}]},"title":"Adaptive Compressive Tracking via Online Vector Boosting Feature Selection.","venue":"CoRR","volume":"abs/1504.05451","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuYZW15","ee":"http://arxiv.org/abs/1504.05451","url":"https://dblp.org/rec/journals/corr/LiuYZW15"}, "url":"URL#3680700" }, { "@score":"1", "@id":"3680702", "info":{"authors":{"author":[{"@pid":"36/6858","text":"Xinyun Liu"},{"@pid":"08/2315","text":"Jiandong Zhu"}]},"title":"On Potential Equations of Finite Games.","venue":"CoRR","volume":"abs/1504.07342","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuZ15a","ee":"http://arxiv.org/abs/1504.07342","url":"https://dblp.org/rec/journals/corr/LiuZ15a"}, "url":"URL#3680702" }, { "@score":"1", "@id":"3680704", "info":{"authors":{"author":[{"@pid":"148/2367","text":"Yunsong Liu"},{"@pid":"148/2387","text":"Zhifang Zhan"},{"@pid":"48/1907-1","text":"Jian-Feng Cai 0001"},{"@pid":"29/7028","text":"Di Guo"},{"@pid":"70/2509-5","text":"Zhong Chen 0005"},{"@pid":"18/8763-1","text":"Xiaobo Qu 0001"}]},"title":"A Simple and Fast Iterative Soft-thresholding Algorithm for Tight Frames in Compressed Sensing Magnetic Resonance Imaging.","venue":"CoRR","volume":"abs/1504.07786","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiuZCGCQ15","ee":"http://arxiv.org/abs/1504.07786","url":"https://dblp.org/rec/journals/corr/LiuZCGCQ15"}, "url":"URL#3680704" }, { "@score":"1", "@id":"3680716", "info":{"authors":{"author":[{"@pid":"22/11262","text":"Lorenzo Livi"},{"@pid":"97/1971","text":"Alireza Sadeghian"}]},"title":"Discrimination and characterization of Parkinsonian rest tremors by analyzing long-term correlations and multifractal signatures.","venue":"CoRR","volume":"abs/1504.02756","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LiviS15","ee":"http://arxiv.org/abs/1504.02756","url":"https://dblp.org/rec/journals/corr/LiviS15"}, "url":"URL#3680716" }, { "@score":"1", "@id":"3680718", "info":{"authors":{"author":{"@pid":"52/5575","text":"Seth Lloyd"}},"title":"Any non-affine one-to-one binary gate suffices for computation.","venue":"CoRR","volume":"abs/1504.03376","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lloyd15","ee":"http://arxiv.org/abs/1504.03376","url":"https://dblp.org/rec/journals/corr/Lloyd15"}, "url":"URL#3680718" }, { "@score":"1", "@id":"3680723", "info":{"authors":{"author":[{"@pid":"l/FernandoGLobo","text":"Fernando G. Lobo"},{"@pid":"05/11267","text":"Mosab Bazargani"}]},"title":"When Hillclimbers Beat Genetic Algorithms in Multimodal Optimization.","venue":"CoRR","volume":"abs/1504.06859","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoboB15","ee":"http://arxiv.org/abs/1504.06859","url":"https://dblp.org/rec/journals/corr/LoboB15"}, "url":"URL#3680723" }, { "@score":"1", "@id":"3680755", "info":{"authors":{"author":[{"@pid":"161/9972","text":"Laëtitia Loncan"},{"@pid":"19/9295","text":"Luís B. Almeida"},{"@pid":"35/4893","text":"José M. Bioucas-Dias"},{"@pid":"28/4214","text":"Xavier Briottet"},{"@pid":"97/2816","text":"Jocelyn Chanussot"},{"@pid":"37/2227","text":"Nicolas Dobigeon"},{"@pid":"86/8951","text":"Sophie Fabre"},{"@pid":"47/7770","text":"Wenzhi Liao"},{"@pid":"70/8947","text":"Giorgio A. Licciardi"},{"@pid":"143/7192","text":"Miguel Simões"},{"@pid":"59/3376","text":"Jean-Yves Tourneret"},{"@pid":"88/7044","text":"Miguel Angel Veganzones"},{"@pid":"62/9764","text":"Gemine Vivone"},{"@pid":"43/2782-2","text":"Qi Wei 0002"},{"@pid":"79/8993","text":"Naoto Yokoya"}]},"title":"Hyperspectral pansharpening: a review.","venue":"CoRR","volume":"abs/1504.04531","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoncanABBCDFLLS15","ee":"http://arxiv.org/abs/1504.04531","url":"https://dblp.org/rec/journals/corr/LoncanABBCDFLLS15"}, "url":"URL#3680755" }, { "@score":"1", "@id":"3680762", "info":{"authors":{"author":[{"@pid":"74/9023","text":"Mingsheng Long"},{"@pid":"06/3456-1","text":"Jianmin Wang 0001"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"}]},"title":"Compositional Correlation Quantization for Large-Scale Multimodal Search.","venue":"CoRR","volume":"abs/1504.04818","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LongWY15","ee":"http://arxiv.org/abs/1504.04818","url":"https://dblp.org/rec/journals/corr/LongWY15"}, "url":"URL#3680762" }, { "@score":"1", "@id":"3680779", "info":{"authors":{"author":[{"@pid":"64/7482","text":"Jose A. Lopez"},{"@pid":"69/6960","text":"Octavia I. Camps"},{"@pid":"14/1686","text":"Mario Sznaier"}]},"title":"Robust Anomaly Detection Using Semidefinite Programming.","venue":"CoRR","volume":"abs/1504.00905","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LopezCS15","ee":"http://arxiv.org/abs/1504.00905","url":"https://dblp.org/rec/journals/corr/LopezCS15"}, "url":"URL#3680779" }, { "@score":"1", "@id":"3680799", "info":{"authors":{"author":{"@pid":"160/9065","text":"Taishan Lou"}},"title":"Desensitized Kalman Filtering with Analytical Gain.","venue":"CoRR","volume":"abs/1504.04916","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lou15a","ee":"http://arxiv.org/abs/1504.04916","url":"https://dblp.org/rec/journals/corr/Lou15a"}, "url":"URL#3680799" }, { "@score":"1", "@id":"3680818", "info":{"authors":{"author":[{"@pid":"80/3901","text":"Daniel Lowd"},{"@pid":"137/4824","text":"Amirmohammad Rooshenas"}]},"title":"The Libra Toolkit for Probabilistic Models.","venue":"CoRR","volume":"abs/1504.00110","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LowdR15","ee":"http://arxiv.org/abs/1504.00110","url":"https://dblp.org/rec/journals/corr/LowdR15"}, "url":"URL#3680818" }, { "@score":"1", "@id":"3680821", "info":{"authors":{"author":[{"@pid":"90/427","text":"Sergey Loyka"},{"@pid":"25/6012","text":"Charalambos D. Charalambous"}]},"title":"An Algorithm for Global Maximization of Secrecy Rates in Gaussian MIMO Wiretap Channels.","venue":"CoRR","volume":"abs/1504.03725","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LoykaC15","ee":"http://arxiv.org/abs/1504.03725","url":"https://dblp.org/rec/journals/corr/LoykaC15"}, "url":"URL#3680821" }, { "@score":"1", "@id":"3680880", "info":{"authors":{"author":[{"@pid":"153/2026","text":"Martin Lück"},{"@pid":"38/5700","text":"Arne Meier"}]},"title":"LTL Fragments are Hard for Standard Parameterisations.","venue":"CoRR","volume":"abs/1504.06187","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuckM15","ee":"http://arxiv.org/abs/1504.06187","url":"https://dblp.org/rec/journals/corr/LuckM15"}, "url":"URL#3680880" }, { "@score":"1", "@id":"3680886", "info":{"authors":{"author":[{"@pid":"162/0183","text":"Abdul Lugo"},{"@pid":"162/0026","text":"Giovanni Calderón"}]},"title":"Un Análisis Comparativo de los Métodos Miméticos, Diferencias Finitas y Elementos Finitos para problemas Estacionarios.","venue":"CoRR","volume":"abs/1504.04913","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LugoC15","ee":"http://arxiv.org/abs/1504.04913","url":"https://dblp.org/rec/journals/corr/LugoC15"}, "url":"URL#3680886" }, { "@score":"1", "@id":"3680912", "info":{"authors":{"author":[{"@pid":"57/11267","text":"Wuqiong Luo"},{"@pid":"45/3753","text":"Wee-Peng Tay"},{"@pid":"08/8335","text":"Mei Leng"}]},"title":"Rumor Spreading and Source Identification: A Hide and Seek Game.","venue":"CoRR","volume":"abs/1504.04796","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LuoTL15","ee":"http://arxiv.org/abs/1504.04796","url":"https://dblp.org/rec/journals/corr/LuoTL15"}, "url":"URL#3680912" }, { "@score":"1", "@id":"3680930", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"20/3896-1","text":"Haibo Li 0001"}]},"title":"Imagining In-Air Interaction for Hemiplegia Sufferer.","venue":"CoRR","volume":"abs/1504.03371","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Lv015","ee":"http://arxiv.org/abs/1504.03371","url":"https://dblp.org/rec/journals/corr/Lv015"}, "url":"URL#3680930" }, { "@score":"1", "@id":"3680932", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"161/9999","text":"Chantal Esteve"},{"@pid":"162/0005","text":"Javier Chirivella"},{"@pid":"162/0198","text":"Pablo Gagliardo"}]},"title":"A Game Based Assistive Tool for Rehabilitation of Dysphonic Patients.","venue":"CoRR","volume":"abs/1504.01030","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvECG15","ee":"http://arxiv.org/abs/1504.01030","url":"https://dblp.org/rec/journals/corr/LvECG15"}, "url":"URL#3680932" }, { "@score":"1", "@id":"3680933", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"161/9999","text":"Chantal Esteve"},{"@pid":"162/0005","text":"Javier Chirivella"},{"@pid":"162/0198","text":"Pablo Gagliardo"}]},"title":"Serious Game Based Dysphonic Rehabilitation Tool.","venue":"CoRR","volume":"abs/1504.03370","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvECG15a","ee":"http://arxiv.org/abs/1504.03370","url":"https://dblp.org/rec/journals/corr/LvECG15a"}, "url":"URL#3680933" }, { "@score":"1", "@id":"3680934", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"161/9999","text":"Chantal Esteve"},{"@pid":"162/0005","text":"Javier Chirivella"},{"@pid":"162/0198","text":"Pablo Gagliardo"}]},"title":"Clinical Feedback and Technology Selection of Game Based Dysphonic Rehabilitation Tool.","venue":"CoRR","volume":"abs/1504.04309","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvECG15b","ee":"http://arxiv.org/abs/1504.04309","url":"https://dblp.org/rec/journals/corr/LvECG15b"}, "url":"URL#3680934" }, { "@score":"1", "@id":"3680935", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"154/9102","text":"Liangbing Feng"},{"@pid":"96/6099","text":"Shengzhong Feng"},{"@pid":"20/3896-1","text":"Haibo Li 0001"}]},"title":"Extending Touch-less Interaction on Vision Based Wearable Device.","venue":"CoRR","volume":"abs/1504.01025","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvFF015","ee":"http://arxiv.org/abs/1504.01025","url":"https://dblp.org/rec/journals/corr/LvFF015"}, "url":"URL#3680935" }, { "@score":"1", "@id":"3680938", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"27/5503","text":"Alaa Halawani"},{"@pid":"96/6099","text":"Shengzhong Feng"},{"@pid":"00/6703-1","text":"Shafiq ur Réhman 0001"},{"@pid":"20/3896-1","text":"Haibo Li 0001"}]},"title":"Touch-less Interactive Augmented Reality Game on Vision Based Wearable Device.","venue":"CoRR","volume":"abs/1504.06359","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvHFR015","ee":"http://arxiv.org/abs/1504.06359","url":"https://dblp.org/rec/journals/corr/LvHFR015"}, "url":"URL#3680938" }, { "@score":"1", "@id":"3680942", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"36/3071","text":"Xiaoming Li"},{"@pid":"18/7217","text":"Baoyun Zhang"},{"@pid":"161/9929","text":"Weixi Wang"},{"@pid":"96/6099","text":"Shengzhong Feng"},{"@pid":"49/8497","text":"Jinxing Hu"}]},"title":"Big City 3D Visual Analysis.","venue":"CoRR","volume":"abs/1504.01379","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvLZWFH15","ee":"http://arxiv.org/abs/1504.01379","url":"https://dblp.org/rec/journals/corr/LvLZWFH15"}, "url":"URL#3680942" }, { "@score":"1", "@id":"3680945", "info":{"authors":{"author":[{"@pid":"21/9114","text":"Zhihan Lv"},{"@pid":"150/8471","text":"Tianyun Su"},{"@pid":"36/3071","text":"Xiaoming Li"},{"@pid":"96/6099","text":"Shengzhong Feng"}]},"title":"3D visual analysis of seabed on smartphone.","venue":"CoRR","volume":"abs/1504.01049","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/LvSLF15","ee":"http://arxiv.org/abs/1504.01049","url":"https://dblp.org/rec/journals/corr/LvSLF15"}, "url":"URL#3680945" }, { "@score":"1", "@id":"3680955", "info":{"authors":{"author":[{"@pid":"162/0075","text":"Manjunath M."},{"@pid":"89/7253","text":"D. H. Manjaiah"}]},"title":"PAR: Petal ant routing algorithm for mobile ad hoc network.","venue":"CoRR","volume":"abs/1504.04420","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MH15","ee":"http://arxiv.org/abs/1504.04420","url":"https://dblp.org/rec/journals/corr/MH15"}, "url":"URL#3680955" }, { "@score":"1", "@id":"3680979", "info":{"authors":{"author":[{"@pid":"74/3608","text":"Lin Ma"},{"@pid":"33/3562","text":"Zhengdong Lu"},{"@pid":"70/4288","text":"Lifeng Shang"},{"@pid":"83/5560-1","text":"Hang Li 0001"}]},"title":"Multimodal Convolutional Neural Networks for Matching Image and Sentence.","venue":"CoRR","volume":"abs/1504.06063","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaLSL15","ee":"http://arxiv.org/abs/1504.06063","url":"https://dblp.org/rec/journals/corr/MaLSL15"}, "url":"URL#3680979" }, { "@score":"1", "@id":"3680980", "info":{"authors":{"author":[{"@pid":"161/9800","text":"Chaofan Ma"},{"@pid":"22/849-1","text":"Wei Liang 0001"},{"@pid":"31/7910-1","text":"Meng Zheng 0001"}]},"title":"Set Covering-based Approximation Algorithm for Delay Constrained Relay Node Placement in Wireless Sensor Networks.","venue":"CoRR","volume":"abs/1504.00832","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaLZ15","ee":"http://arxiv.org/abs/1504.00832","url":"https://dblp.org/rec/journals/corr/MaLZ15"}, "url":"URL#3680980" }, { "@score":"1", "@id":"3681016", "info":{"authors":{"author":[{"@pid":"118/5967","text":"Nuno Macedo"},{"@pid":"07/8132","text":"Jorge Tiago"},{"@pid":"65/603","text":"Alcino Cunha"}]},"title":"A Feature-based Classification of Model Repair Approaches.","venue":"CoRR","volume":"abs/1504.03947","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MacedoTC15","ee":"http://arxiv.org/abs/1504.03947","url":"https://dblp.org/rec/journals/corr/MacedoTC15"}, "url":"URL#3681016" }, { "@score":"1", "@id":"3681017", "info":{"authors":{"author":[{"@pid":"162/0018","text":"Emerson Lopes Machado"},{"@pid":"154/1405","text":"Cristiano Jacques Miosso"},{"@pid":"01/8859","text":"Ricardo von Borries"},{"@pid":"13/3781","text":"Murilo Coutinho"},{"@pid":"121/4492","text":"Pedro de Azevedo Berger"},{"@pid":"162/0049","text":"Thiago Marques"},{"@pid":"06/5774","text":"Ricardo Pezzuol Jacobi"}]},"title":"Computational Cost Reduction in Learned Transform Classifications.","venue":"CoRR","volume":"abs/1504.06779","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MachadoMBCBMJ15","ee":"http://arxiv.org/abs/1504.06779","url":"https://dblp.org/rec/journals/corr/MachadoMBCBMJ15"}, "url":"URL#3681017" }, { "@score":"1", "@id":"3681019", "info":{"authors":{"author":[{"@pid":"95/10669","text":"Jeaneth Machicao"},{"@pid":"28/7617","text":"Jan M. Baetens"},{"@pid":"47/10670","text":"Anderson G. Marco"},{"@pid":"96/4375","text":"Bernard De Baets"},{"@pid":"17/6770","text":"Odemir M. Bruno"}]},"title":"A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems.","venue":"CoRR","volume":"abs/1504.02549","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MachicaoBMBB15","ee":"http://arxiv.org/abs/1504.02549","url":"https://dblp.org/rec/journals/corr/MachicaoBMBB15"}, "url":"URL#3681019" }, { "@score":"1", "@id":"3681021", "info":{"authors":{"author":[{"@pid":"151/6470","text":"Alexander Mäcker"},{"@pid":"138/7323","text":"Manuel Malatyali"},{"@pid":"h/FMaufderHeide","text":"Friedhelm Meyer auf der Heide"},{"@pid":"147/3364","text":"Sören Riechers"}]},"title":"Non-Preemptive Scheduling on Machines with Setup Times.","venue":"CoRR","volume":"abs/1504.07066","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MackerMHR15","ee":"http://arxiv.org/abs/1504.07066","url":"https://dblp.org/rec/journals/corr/MackerMHR15"}, "url":"URL#3681021" }, { "@score":"1", "@id":"3681022", "info":{"authors":{"author":[{"@pid":"162/0170","text":"Erika Mackin"},{"@pid":"73/4036","text":"Lirong Xia"}]},"title":"Allocating Indivisible Items in Categorized Domains.","venue":"CoRR","volume":"abs/1504.05932","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MackinX15","ee":"http://arxiv.org/abs/1504.05932","url":"https://dblp.org/rec/journals/corr/MackinX15"}, "url":"URL#3681022" }, { "@score":"1", "@id":"3681025", "info":{"authors":{"author":[{"@pid":"143/7512","text":"Dougal Maclaurin"},{"@pid":"86/9380","text":"David Duvenaud"},{"@pid":"32/909","text":"Ryan P. Adams"}]},"title":"Early Stopping is Nonparametric Variational Inference.","venue":"CoRR","volume":"abs/1504.01344","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaclaurinDA15a","ee":"http://arxiv.org/abs/1504.01344","url":"https://dblp.org/rec/journals/corr/MaclaurinDA15a"}, "url":"URL#3681025" }, { "@score":"1", "@id":"3681067", "info":{"authors":{"author":[{"@pid":"150/1771","text":"Milad Mahdian"},{"@pid":"72/5346","text":"Edmund M. Yeh"}]},"title":"Throughput-Delay Tradeoffs in Content-Centric Wireless Networks.","venue":"CoRR","volume":"abs/1504.03754","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahdianY15","ee":"http://arxiv.org/abs/1504.03754","url":"https://dblp.org/rec/journals/corr/MahdianY15"}, "url":"URL#3681067" }, { "@score":"1", "@id":"3681079", "info":{"authors":{"author":[{"@pid":"123/7722","text":"Ahmad Mahmoody"},{"@pid":"u/EliUpfal","text":"Eli Upfal"}]},"title":"The Probabilistic Hitting Set Paradigm: a General Framework for Search and Detection in Dynamic Social Networks.","venue":"CoRR","volume":"abs/1504.03275","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MahmoodyU15","ee":"http://arxiv.org/abs/1504.03275","url":"https://dblp.org/rec/journals/corr/MahmoodyU15"}, "url":"URL#3681079" }, { "@score":"1", "@id":"3681085", "info":{"authors":{"author":[{"@pid":"162/0035","text":"Tiep Mai"},{"@pid":"24/2712","text":"Deepak Ajwani"},{"@pid":"27/4656","text":"Alessandra Sala"}]},"title":"Profiling user activities with minimal traffic traces.","venue":"CoRR","volume":"abs/1504.01781","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaiAS15","ee":"http://arxiv.org/abs/1504.01781","url":"https://dblp.org/rec/journals/corr/MaiAS15"}, "url":"URL#3681085" }, { "@score":"1", "@id":"3681099", "info":{"authors":{"author":[{"@pid":"31/10551","text":"Arpita Maitra"},{"@pid":"67/1220","text":"Goutam Paul 0001"},{"@pid":"25/888","text":"Asim K. Pal"}]},"title":"Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms.","venue":"CoRR","volume":"abs/1504.01974","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaitraPP15","ee":"http://arxiv.org/abs/1504.01974","url":"https://dblp.org/rec/journals/corr/MaitraPP15"}, "url":"URL#3681099" }, { "@score":"1", "@id":"3681121", "info":{"authors":{"author":[{"@pid":"43/863","text":"Behrooz Makki"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"68/2707","text":"Tommy Svensson"}]},"title":"On the Performance of the Relay-ARQ Networks.","venue":"CoRR","volume":"abs/1504.04113","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakkiES15","ee":"http://arxiv.org/abs/1504.04113","url":"https://dblp.org/rec/journals/corr/MakkiES15"}, "url":"URL#3681121" }, { "@score":"1", "@id":"3681122", "info":{"authors":{"author":[{"@pid":"43/863","text":"Behrooz Makki"},{"@pid":"68/2707","text":"Tommy Svensson"},{"@pid":"64/2235","text":"Thomas Eriksson"},{"@pid":"64/6304","text":"Mohamed-Slim Alouini"}]},"title":"On the Required Number of Antennas in a Point-to-Point Large-but-Finite MIMO System: Outage-Limited Scenario.","venue":"CoRR","volume":"abs/1504.08231","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MakkiSEA15","ee":"http://arxiv.org/abs/1504.08231","url":"https://dblp.org/rec/journals/corr/MakkiSEA15"}, "url":"URL#3681122" }, { "@score":"1", "@id":"3681135", "info":{"authors":{"author":[{"@pid":"29/9879","text":"Mohammadreza Malek-Mohammadi"},{"@pid":"51/3888","text":"Massoud Babaie-Zadeh"},{"@pid":"15/4074","text":"Mikael Skoglund"}]},"title":"Iterative Concave Rank Approximation for Recovering Low-Rank Matrices.","venue":"CoRR","volume":"abs/1504.01158","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Malek-Mohammadi15","ee":"http://arxiv.org/abs/1504.01158","url":"https://dblp.org/rec/journals/corr/Malek-Mohammadi15"}, "url":"URL#3681135" }, { "@score":"1", "@id":"3681136", "info":{"authors":{"author":[{"@pid":"29/9879","text":"Mohammadreza Malek-Mohammadi"},{"@pid":"52/4530","text":"Cristian R. Rojas"},{"@pid":"10/5572","text":"Magnus Jansson"},{"@pid":"51/3888","text":"Massoud Babaie-Zadeh"}]},"title":"Upper Bounds on the Error of Sparse Vector and Low-Rank Matrix Recovery.","venue":"CoRR","volume":"abs/1504.03195","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Malek-Mohammadi15a","ee":"http://arxiv.org/abs/1504.03195","url":"https://dblp.org/rec/journals/corr/Malek-Mohammadi15a"}, "url":"URL#3681136" }, { "@score":"1", "@id":"3681146", "info":{"authors":{"author":[{"@pid":"156/0036","text":"M. J. Malinowski"},{"@pid":"168/8642","text":"Evangelos Matsinos"}]},"title":"Comparative study of the two versions of the Microsoft KinectTM sensor in regard to the analysis of human motion.","venue":"CoRR","volume":"abs/1504.00221","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MalinowskiM15","ee":"http://arxiv.org/abs/1504.00221","url":"https://dblp.org/rec/journals/corr/MalinowskiM15"}, "url":"URL#3681146" }, { "@score":"1", "@id":"3681166", "info":{"authors":{"author":[{"@pid":"90/6532","text":"Marco Mamei"},{"@pid":"24/9516","text":"Massimo Colonna"}]},"title":"Estimating Attendance From Cellular Network Data.","venue":"CoRR","volume":"abs/1504.07385","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MameiC15","ee":"http://arxiv.org/abs/1504.07385","url":"https://dblp.org/rec/journals/corr/MameiC15"}, "url":"URL#3681166" }, { "@score":"1", "@id":"3681172", "info":{"authors":{"author":[{"@pid":"05/8251","text":"Prashanti Manda"},{"@pid":"42/2299","text":"Fiona M. McCarthy"},{"@pid":"28/3404","text":"Bindu Nanduri"},{"@pid":"b/SusanMBridges","text":"Susan M. Bridges"}]},"title":"Information Theoretic Interestingness Measures for Cross-Ontology Data Mining in the Mouse Anatomy Ontology and the Gene Ontology.","venue":"CoRR","volume":"abs/1504.08027","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MandaMNB15","ee":"http://arxiv.org/abs/1504.08027","url":"https://dblp.org/rec/journals/corr/MandaMNB15"}, "url":"URL#3681172" }, { "@score":"1", "@id":"3681184", "info":{"authors":{"author":[{"@pid":"m/SebastianManeth","text":"Sebastian Maneth"},{"@pid":"159/1834","text":"Fabian Peternek"}]},"title":"A Survey on Methods and Systems for Graph Compression.","venue":"CoRR","volume":"abs/1504.00616","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/ManethP15","ee":"http://arxiv.org/abs/1504.00616","url":"https://dblp.org/rec/journals/corr/ManethP15"}, "url":"URL#3681184" }, { "@score":"1", "@id":"3681225", "info":{"authors":{"author":[{"@pid":"10/3104","text":"Dong Mao"},{"@pid":"w/YangWang20","text":"Yang Wang 0020"},{"@pid":"87/2533-3","text":"Qiang Wu 0003"}]},"title":"A new approach for physiological time series.","venue":"CoRR","volume":"abs/1504.06274","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaoWW15","ee":"http://arxiv.org/abs/1504.06274","url":"https://dblp.org/rec/journals/corr/MaoWW15"}, "url":"URL#3681225" }, { "@score":"1", "@id":"3681226", "info":{"authors":{"author":[{"@pid":"136/1118","text":"Junhua Mao"},{"@pid":"32/1213-17","text":"Wei Xu 0017"},{"@pid":"33/4854-7","text":"Yi Yang 0007"},{"@pid":"01/2998-1","text":"Jiang Wang 0001"},{"@pid":"67/3447","text":"Zhiheng Huang"},{"@pid":"y/AlanLYuille","text":"Alan L. Yuille"}]},"title":"Learning like a Child: Fast Novel Visual Concept Learning from Sentence Descriptions of Images.","venue":"CoRR","volume":"abs/1504.06692","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MaoXYWHY15","ee":"http://arxiv.org/abs/1504.06692","url":"https://dblp.org/rec/journals/corr/MaoXYWHY15"}, "url":"URL#3681226" }, { "@score":"1", "@id":"3681246", "info":{"authors":{"author":[{"@pid":"161/9839","text":"Sebastian R. Lamelas Marcote"},{"@pid":"62/5292","text":"Martin Monperrus"}]},"title":"Automatic Repair of Infinite Loops.","venue":"CoRR","volume":"abs/1504.05078","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarcoteM15","ee":"http://arxiv.org/abs/1504.05078","url":"https://dblp.org/rec/journals/corr/MarcoteM15"}, "url":"URL#3681246" }, { "@score":"1", "@id":"3681265", "info":{"authors":{"author":[{"@pid":"57/607","text":"Mike A. Marin"},{"@pid":"161/9799","text":"Jay A. Brown"}]},"title":"Implementing a Case Management Modeling and Notation (CMMN) System using a Content Management Interoperability Services (CMIS) compliant repository.","venue":"CoRR","volume":"abs/1504.06778","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarinB15","ee":"http://arxiv.org/abs/1504.06778","url":"https://dblp.org/rec/journals/corr/MarinB15"}, "url":"URL#3681265" }, { "@score":"1", "@id":"3681275", "info":{"authors":{"author":[{"@pid":"58/1744","text":"Nadya Markin"},{"@pid":"123/4546","text":"Eldho K. Thomas"},{"@pid":"o/FrederiqueEOggier","text":"Frédérique E. Oggier"}]},"title":"On Group Violations of Inequalities in five Subgroups.","venue":"CoRR","volume":"abs/1504.01359","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarkinTO15","ee":"http://arxiv.org/abs/1504.01359","url":"https://dblp.org/rec/journals/corr/MarkinTO15"}, "url":"URL#3681275" }, { "@score":"1", "@id":"3681281", "info":{"authors":{"author":[{"@pid":"154/3529","text":"Antonio G. Marques"},{"@pid":"125/2340","text":"Santiago Segarra"},{"@pid":"50/3359","text":"Geert Leus"},{"@pid":"32/15","text":"Alejandro Ribeiro"}]},"title":"Sampling of graph signals with successive local aggregations.","venue":"CoRR","volume":"abs/1504.04687","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarquesSLR15","ee":"http://arxiv.org/abs/1504.04687","url":"https://dblp.org/rec/journals/corr/MarquesSLR15"}, "url":"URL#3681281" }, { "@score":"1", "@id":"3681289", "info":{"authors":{"author":[{"@pid":"123/3364","text":"Hanaa Marshoud"},{"@pid":"42/1218","text":"Vasilios M. Kapinas"},{"@pid":"13/5195","text":"George K. Karagiannidis"},{"@pid":"14/7881","text":"Sami Muhaidat"}]},"title":"Non-Orthogonal Multiple Access for Visible Light Communications.","venue":"CoRR","volume":"abs/1504.00934","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarshoudKKM15","ee":"http://arxiv.org/abs/1504.00934","url":"https://dblp.org/rec/journals/corr/MarshoudKKM15"}, "url":"URL#3681289" }, { "@score":"1", "@id":"3681313", "info":{"authors":{"author":[{"@pid":"162/0200","text":"Eduardo Alejandro Martinez-Ceseña"},{"@pid":"137/8761","text":"Pierluigi Mancarella"},{"@pid":"57/1167","text":"Mamadou Ndiaye"},{"@pid":"33/7134","text":"Markus Schläpfer"}]},"title":"Using Mobile Phone Data for Electricity Infrastructure Planning.","venue":"CoRR","volume":"abs/1504.03899","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Martinez-Cesena15","ee":"http://arxiv.org/abs/1504.03899","url":"https://dblp.org/rec/journals/corr/Martinez-Cesena15"}, "url":"URL#3681313" }, { "@score":"1", "@id":"3681340", "info":{"authors":{"author":[{"@pid":"119/1477","text":"Smit Marvaniya"},{"@pid":"97/4979","text":"Raj Gupta"},{"@pid":"59/6614","text":"Anurag Mittal"}]},"title":"Adaptive Locally Affine-Invariant Shape Matching.","venue":"CoRR","volume":"abs/1504.06719","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarvaniyaGM15","ee":"http://arxiv.org/abs/1504.06719","url":"https://dblp.org/rec/journals/corr/MarvaniyaGM15"}, "url":"URL#3681340" }, { "@score":"1", "@id":"3681342", "info":{"authors":{"author":[{"@pid":"95/1832","text":"Dániel Marx"},{"@pid":"61/8036","text":"Michal Pilipczuk"}]},"title":"Optimal parameterized algorithms for planar facility location problems using Voronoi diagrams.","venue":"CoRR","volume":"abs/1504.05476","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarxP15","ee":"http://arxiv.org/abs/1504.05476","url":"https://dblp.org/rec/journals/corr/MarxP15"}, "url":"URL#3681342" }, { "@score":"1", "@id":"3681348", "info":{"authors":{"author":[{"@pid":"143/7392","text":"Sarah E. Marzen"},{"@pid":"44/10997","text":"Michael Robert DeWeese"},{"@pid":"16/6123","text":"James P. Crutchfield"}]},"title":"Time Resolution Dependence of Information Measures for Spiking Neurons: Atoms, Scaling, and Universality.","venue":"CoRR","volume":"abs/1504.04756","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MarzenDC15","ee":"http://arxiv.org/abs/1504.04756","url":"https://dblp.org/rec/journals/corr/MarzenDC15"}, "url":"URL#3681348" }, { "@score":"1", "@id":"3681360", "info":{"authors":{"author":[{"@pid":"161/9864","text":"Mahdi Boloursaz Mashhadi"},{"@pid":"117/8770","text":"Ehsan Asadi"},{"@pid":"161/5030","text":"Mohsen Eskandari"},{"@pid":"161/9959","text":"Shahrzad Kiani"},{"@pid":"06/1232","text":"Farrokh Marvasti"}]},"title":"Heart Rate Tracking using Wrist-Type Photoplethysmographic (PPG) Signals during Physical Exercise with Simultaneous Accelerometry.","venue":"CoRR","volume":"abs/1504.04785","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MashhadiAEKM15","ee":"http://arxiv.org/abs/1504.04785","url":"https://dblp.org/rec/journals/corr/MashhadiAEKM15"}, "url":"URL#3681360" }, { "@score":"1", "@id":"3681378", "info":{"authors":{"author":[{"@pid":"162/0065","text":"Joan T. Matamalas"},{"@pid":"42/8906","text":"Julia Poncela-Casasnovas"},{"@pid":"75/6382","text":"Sergio Gómez"},{"@pid":"41/11094","text":"Alex Arenas"}]},"title":"Strategical incoherence regulates cooperation in social dilemmas on multiplex networks.","venue":"CoRR","volume":"abs/1504.04735","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MatamalasPGA15","ee":"http://arxiv.org/abs/1504.04735","url":"https://dblp.org/rec/journals/corr/MatamalasPGA15"}, "url":"URL#3681378" }, { "@score":"1", "@id":"3681382", "info":{"authors":{"author":[{"@pid":"14/8049","text":"K. Ashik Mathew"},{"@pid":"o/PatricRJOstergard","text":"Patric R. J. Östergård"}]},"title":"New Lower Bounds for the Shannon Capacity of Odd Cycles.","venue":"CoRR","volume":"abs/1504.01472","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MathewO15","ee":"http://arxiv.org/abs/1504.01472","url":"https://dblp.org/rec/journals/corr/MathewO15"}, "url":"URL#3681382" }, { "@score":"1", "@id":"3681392", "info":{"authors":{"author":[{"@pid":"49/11148","text":"Paulo Matias"},{"@pid":"158/8057","text":"Rafael Tuma Guariento"},{"@pid":"91/11150","text":"Lírio Onofre Baptista de Almeida"},{"@pid":"83/1879","text":"Jan Frans Willem Slaets"}]},"title":"Modular Acquisition and Stimulation System for Timestamp-Driven Neuroscience Experiments.","venue":"CoRR","volume":"abs/1504.01718","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MatiasGAS15","ee":"http://arxiv.org/abs/1504.01718","url":"https://dblp.org/rec/journals/corr/MatiasGAS15"}, "url":"URL#3681392" }, { "@score":"1", "@id":"3681405", "info":{"authors":{"author":[{"@pid":"150/6367","text":"Maximilian Matthé"},{"@pid":"f/GFettweis","text":"Gerhard P. Fettweis"}]},"title":"Conjugate-Root Offset-QAM for Orthogonal Multicarrier Transmission.","venue":"CoRR","volume":"abs/1504.00126","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MattheF15","ee":"http://arxiv.org/abs/1504.00126","url":"https://dblp.org/rec/journals/corr/MattheF15"}, "url":"URL#3681405" }, { "@score":"1", "@id":"3681440", "info":{"authors":{"author":[{"@pid":"129/1633","text":"Filip Mazowiecki"},{"@pid":"72/4028","text":"Cristian Riveros"}]},"title":"On the expressibility of copyless cost register automata.","venue":"CoRR","volume":"abs/1504.01709","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MazowieckiR15","ee":"http://arxiv.org/abs/1504.01709","url":"https://dblp.org/rec/journals/corr/MazowieckiR15"}, "url":"URL#3681440" }, { "@score":"1", "@id":"3681442", "info":{"authors":{"author":[{"@pid":"91/874","text":"Wojciech Mazurczyk"},{"@pid":"76/6202","text":"Luca Caviglione"}]},"title":"Information Hiding as a Challenge for Malware Detection.","venue":"CoRR","volume":"abs/1504.04867","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MazurczykC15","ee":"http://arxiv.org/abs/1504.04867","url":"https://dblp.org/rec/journals/corr/MazurczykC15"}, "url":"URL#3681442" }, { "@score":"1", "@id":"3681445", "info":{"authors":{"author":[{"@pid":"161/9771","text":"Irina Mbogo"},{"@pid":"162/0176","text":"Dmitry Prokudin"},{"@pid":"184/1986","text":"Andrey V. Chugunov"}]},"title":"Complex Integration of Digital Collections into Scientific Information Space.","venue":"CoRR","volume":"abs/1504.04826","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MbogoPC15","ee":"http://arxiv.org/abs/1504.04826","url":"https://dblp.org/rec/journals/corr/MbogoPC15"}, "url":"URL#3681445" }, { "@score":"1", "@id":"3681472", "info":{"authors":{"author":[{"@pid":"181/2397","text":"Andrew W. McPherson"},{"@pid":"83/10607","text":"Andrew Roth"},{"@pid":"88/7968","text":"Gavin Ha"},{"@pid":"25/4249","text":"Sohrab P. Shah"},{"@pid":"52/3751","text":"Cédric Chauve"},{"@pid":"s/SCSahinalp","text":"Süleyman Cenk Sahinalp"}]},"title":"Joint Inference of Genome Structure and Content in Heterogeneous Tumour Samples.","venue":"CoRR","volume":"abs/1504.03080","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/McPhersonRHSCS15","ee":"http://arxiv.org/abs/1504.03080","url":"https://dblp.org/rec/journals/corr/McPhersonRHSCS15"}, "url":"URL#3681472" }, { "@score":"1", "@id":"3681485", "info":{"authors":{"author":[{"@pid":"25/9061","text":"Kitty Meeks"},{"@pid":"162/0033","text":"Dominik K. Vu"}]},"title":"Extremal properties of flood-filling games.","venue":"CoRR","volume":"abs/1504.00596","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MeeksV15","ee":"http://arxiv.org/abs/1504.00596","url":"https://dblp.org/rec/journals/corr/MeeksV15"}, "url":"URL#3681485" }, { "@score":"1", "@id":"3681489", "info":{"authors":{"author":{"@pid":"12/3598","text":"Natarajan Meghanathan"}},"title":"Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Scale Free Networks and Small World Networks.","venue":"CoRR","volume":"abs/1504.02504","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Meghanathan15","ee":"http://arxiv.org/abs/1504.02504","url":"https://dblp.org/rec/journals/corr/Meghanathan15"}, "url":"URL#3681489" }, { "@score":"1", "@id":"3681501", "info":{"authors":{"author":[{"@pid":"151/6660","text":"Dhagash Mehta"},{"@pid":"30/6047","text":"Crina Grosan"}]},"title":"A Collection of Challenging Optimization Problems in Science, Engineering and Economics.","venue":"CoRR","volume":"abs/1504.02366","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MehtaG15","ee":"http://arxiv.org/abs/1504.02366","url":"https://dblp.org/rec/journals/corr/MehtaG15"}, "url":"URL#3681501" }, { "@score":"1", "@id":"3681524", "info":{"authors":{"author":[{"@pid":"120/9619","text":"Marios Meimaris"},{"@pid":"44/2379","text":"George Papastefanatos"},{"@pid":"46/5728","text":"Christos Pateritsas"},{"@pid":"153/0533","text":"Theodora Galani"},{"@pid":"62/1193","text":"Yannis Stavrakas"}]},"title":"A Framework for Managing Evolving Information Resources on the Data Web.","venue":"CoRR","volume":"abs/1504.06451","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MeimarisPPGS15","ee":"http://arxiv.org/abs/1504.06451","url":"https://dblp.org/rec/journals/corr/MeimarisPPGS15"}, "url":"URL#3681524" }, { "@score":"1", "@id":"3681525", "info":{"authors":{"author":[{"@pid":"120/9619","text":"Marios Meimaris"},{"@pid":"44/2379","text":"George Papastefanatos"},{"@pid":"v/SViglas","text":"Stratis Viglas"},{"@pid":"62/1193","text":"Yannis Stavrakas"},{"@pid":"46/5728","text":"Christos Pateritsas"}]},"title":"A Query Language for Multi-version Data Web Archives.","venue":"CoRR","volume":"abs/1504.01891","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MeimarisPVSP15","ee":"http://arxiv.org/abs/1504.01891","url":"https://dblp.org/rec/journals/corr/MeimarisPVSP15"}, "url":"URL#3681525" }, { "@score":"1", "@id":"3681533", "info":{"authors":{"author":[{"@pid":"161/9847","text":"A. Melakheso"},{"@pid":"41/2162","text":"Kenza Guenda"}]},"title":"The Dual and the Gray Image of Codes over Fq+vFq+v2Fq.","venue":"CoRR","volume":"abs/1504.08097","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MelakhesoG15","ee":"http://arxiv.org/abs/1504.08097","url":"https://dblp.org/rec/journals/corr/MelakhesoG15"}, "url":"URL#3681533" }, { "@score":"1", "@id":"3681542", "info":{"authors":{"author":[{"@pid":"31/11075-3","text":"Alexey A. Melnikov 0001"},{"@pid":"130/3994","text":"Adi Makmal"},{"@pid":"82/8260","text":"Vedran Dunjko"},{"@pid":"06/698","text":"Hans J. Briegel"}]},"title":"Projective simulation with generalization.","venue":"CoRR","volume":"abs/1504.02247","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MelnikovMDB15","ee":"http://arxiv.org/abs/1504.02247","url":"https://dblp.org/rec/journals/corr/MelnikovMDB15"}, "url":"URL#3681542" }, { "@score":"1", "@id":"3681582", "info":{"authors":{"author":[{"@pid":"161/9850","text":"Michael Menz"},{"@pid":"150/6954","text":"Justin Wang"},{"@pid":"162/0060-3","text":"Jiyang Xie 0003"}]},"title":"Discrete All-Pay Bidding Games.","venue":"CoRR","volume":"abs/1504.02799","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MenzWX15","ee":"http://arxiv.org/abs/1504.02799","url":"https://dblp.org/rec/journals/corr/MenzWX15"}, "url":"URL#3681582" }, { "@score":"1", "@id":"3681602", "info":{"authors":{"author":[{"@pid":"49/6721","text":"Panayotis Mertikopoulos"},{"@pid":"80/613","text":"Elena Veronica Belmega"}]},"title":"Learning to be green: robust energy efficiency maximization in dynamic MIMO-OFDM systems.","venue":"CoRR","volume":"abs/1504.03903","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MertikopoulosB15","ee":"http://arxiv.org/abs/1504.03903","url":"https://dblp.org/rec/journals/corr/MertikopoulosB15"}, "url":"URL#3681602" }, { "@score":"1", "@id":"3681619", "info":{"authors":{"author":[{"@pid":"73/9489","text":"Alejandro Metke-Jimenez"},{"@pid":"85/1259","text":"Sarvnaz Karimi"}]},"title":"Concept Extraction to Identify Adverse Drug Reactions in Medical Forums: A Comparison of Algorithms.","venue":"CoRR","volume":"abs/1504.06936","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Metke-JimenezK15","ee":"http://arxiv.org/abs/1504.06936","url":"https://dblp.org/rec/journals/corr/Metke-JimenezK15"}, "url":"URL#3681619" }, { "@score":"1", "@id":"3681640", "info":{"authors":{"author":[{"@pid":"73/374","text":"Zhixin Miao"},{"@pid":"11/2636-1","text":"Lingling Fan 0001"}]},"title":"Achieving Economic Operation and Secondary Frequency Regulation Simultaneously Through Feedback Control.","venue":"CoRR","volume":"abs/1504.03524","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MiaoF15","ee":"http://arxiv.org/abs/1504.03524","url":"https://dblp.org/rec/journals/corr/MiaoF15"}, "url":"URL#3681640" }, { "@score":"1", "@id":"3681659", "info":{"authors":{"author":[{"@pid":"131/6731","text":"Kristopher K. Micinski"},{"@pid":"161/9888","text":"Jonathan Fetter-Degges"},{"@pid":"15/4848","text":"Jinseong Jeon"},{"@pid":"18/2050","text":"Jeffrey S. Foster"},{"@pid":"85/6767","text":"Michael R. Clarkson"}]},"title":"Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution.","venue":"CoRR","volume":"abs/1504.03711","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MicinskiFJFC15","ee":"http://arxiv.org/abs/1504.03711","url":"https://dblp.org/rec/journals/corr/MicinskiFJFC15"}, "url":"URL#3681659" }, { "@score":"1", "@id":"3681680", "info":{"authors":{"author":[{"@pid":"139/0871","text":"Mostafa Milani"},{"@pid":"b/LEBertossi","text":"Leopoldo E. Bertossi"}]},"title":"Tractable Query Answering and Optimization for Extensions of Weakly-Sticky Datalog+-.","venue":"CoRR","volume":"abs/1504.03386","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MilaniB15","ee":"http://arxiv.org/abs/1504.03386","url":"https://dblp.org/rec/journals/corr/MilaniB15"}, "url":"URL#3681680" }, { "@score":"1", "@id":"3681705", "info":{"authors":{"author":{"@pid":"161/9943","text":"Emiel van Miltenburg"}},"title":"Detecting and ordering adjectival scalemates.","venue":"CoRR","volume":"abs/1504.08102","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Miltenburg15","ee":"http://arxiv.org/abs/1504.08102","url":"https://dblp.org/rec/journals/corr/Miltenburg15"}, "url":"URL#3681705" }, { "@score":"1", "@id":"3681722", "info":{"authors":{"author":[{"@pid":"161/9807","text":"Nguyen Van Minh"},{"@pid":"20/9406","text":"Le Hoang Son"}]},"title":"Fuzzy approaches to context variable in fuzzy geographically weighted clustering.","venue":"CoRR","volume":"abs/1504.03558","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MinhS15","ee":"http://arxiv.org/abs/1504.03558","url":"https://dblp.org/rec/journals/corr/MinhS15"}, "url":"URL#3681722" }, { "@score":"1", "@id":"3681723", "info":{"authors":{"author":[{"@pid":"162/0173","text":"Shahryar Minhas"},{"@pid":"63/8010","text":"Peter D. Hoff"},{"@pid":"161/9814","text":"Michael D. Ward"}]},"title":"Relax, Tensors Are Here: Dependencies in International Processes.","venue":"CoRR","volume":"abs/1504.08218","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MinhasHW15","ee":"http://arxiv.org/abs/1504.08218","url":"https://dblp.org/rec/journals/corr/MinhasHW15"}, "url":"URL#3681723" }, { "@score":"1", "@id":"3681742", "info":{"authors":{"author":[{"@pid":"50/3538","text":"Isabelle Mirbel"},{"@pid":"77/2613","text":"Pierre Crescenzo"}]},"title":"From End-User's Requirements to Web Services Retrieval: A Semantic and Intention-Driven Approach.","venue":"CoRR","volume":"abs/1504.06158","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MirbelC15a","ee":"http://arxiv.org/abs/1504.06158","url":"https://dblp.org/rec/journals/corr/MirbelC15a"}, "url":"URL#3681742" }, { "@score":"1", "@id":"3681763", "info":{"authors":{"author":[{"@pid":"131/6855","text":"Dmytro Mishkin"},{"@pid":"m/JiriMatas","text":"Jiri Matas"},{"@pid":"76/3086","text":"Michal Perdoch"},{"@pid":"78/11341","text":"Karel Lenc"}]},"title":"WxBS: Wide Baseline Stereo Generalizations.","venue":"CoRR","volume":"abs/1504.06603","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MishkinMPL15","ee":"http://arxiv.org/abs/1504.06603","url":"https://dblp.org/rec/journals/corr/MishkinMPL15"}, "url":"URL#3681763" }, { "@score":"1", "@id":"3681767", "info":{"authors":{"author":[{"@pid":"05/9669","text":"Manoj Mishra"},{"@pid":"28/5000","text":"Bikash Kumar Dey"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"}]},"title":"On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel.","venue":"CoRR","volume":"abs/1504.04499","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MishraDPD15","ee":"http://arxiv.org/abs/1504.04499","url":"https://dblp.org/rec/journals/corr/MishraDPD15"}, "url":"URL#3681767" }, { "@score":"1", "@id":"3681772", "info":{"authors":{"author":[{"@pid":"05/9669","text":"Manoj Mishra"},{"@pid":"161/9816","text":"Tanmay Sharma"},{"@pid":"28/5000","text":"Bikash Kumar Dey"},{"@pid":"20/5817","text":"Vinod M. Prabhakaran"}]},"title":"Private Data Transfer over a Broadcast Channel.","venue":"CoRR","volume":"abs/1504.01101","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MishraSDP15","ee":"http://arxiv.org/abs/1504.01101","url":"https://dblp.org/rec/journals/corr/MishraSDP15"}, "url":"URL#3681772" }, { "@score":"1", "@id":"3681773", "info":{"authors":{"author":[{"@pid":"16/7607","text":"Shaunak Mishra"},{"@pid":"123/7829","text":"Yasser Shoukry"},{"@pid":"27/488","text":"Nikhil Karamchandani"},{"@pid":"d/SNDiggavi","text":"Suhas N. Diggavi"},{"@pid":"43/2753","text":"Paulo Tabuada"}]},"title":"Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of Noise.","venue":"CoRR","volume":"abs/1504.05566","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MishraSKDT15","ee":"http://arxiv.org/abs/1504.05566","url":"https://dblp.org/rec/journals/corr/MishraSKDT15"}, "url":"URL#3681773" }, { "@score":"1", "@id":"3681786", "info":{"authors":{"author":[{"@pid":"m/JosephSBMitchell","text":"Joseph S. B. Mitchell"},{"@pid":"52/2297","text":"Valentin Polishchuk"},{"@pid":"53/8655","text":"Mikko Sysikaski"},{"@pid":"71/3863-1","text":"Haitao Wang 0001"}]},"title":"An Optimal Algorithm for Minimum-Link Rectilinear Paths in Triangulated Rectilinear Domains.","venue":"CoRR","volume":"abs/1504.06842","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MitchellPSW15","ee":"http://arxiv.org/abs/1504.06842","url":"https://dblp.org/rec/journals/corr/MitchellPSW15"}, "url":"URL#3681786" }, { "@score":"1", "@id":"3681790", "info":{"authors":{"author":{"@pid":"120/6812","text":"Adway Mitra"}},"title":"Exploring Bayesian Models for Multi-level Clustering of Hierarchically Grouped Sequential Data.","venue":"CoRR","volume":"abs/1504.04850","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mitra15","ee":"http://arxiv.org/abs/1504.04850","url":"https://dblp.org/rec/journals/corr/Mitra15"}, "url":"URL#3681790" }, { "@score":"1", "@id":"3681825", "info":{"authors":{"author":[{"@pid":"64/6427","text":"Rami Mochaourab"},{"@pid":"17/10836","text":"Rasmus Brandt"},{"@pid":"87/9366","text":"Hadi G. Ghauch"},{"@pid":"31/1869","text":"Mats Bengtsson"}]},"title":"Overhead-Aware Distributed CSI Selection in the MIMO Interference Channel.","venue":"CoRR","volume":"abs/1504.06794","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MochaourabBGB15","ee":"http://arxiv.org/abs/1504.06794","url":"https://dblp.org/rec/journals/corr/MochaourabBGB15"}, "url":"URL#3681825" }, { "@score":"1", "@id":"3681836", "info":{"authors":{"author":[{"@pid":"136/4965","text":"Mohammad R. Vedady Moghadam"},{"@pid":"60/2536-6","text":"Rui Zhang 0006"}]},"title":"Multiuser Wireless Power Transfer via Magnetic Resonant Coupling: Performance Analysis, Charging Control, and Power Region Characterization.","venue":"CoRR","volume":"abs/1504.08090","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoghadamZ15a","ee":"http://arxiv.org/abs/1504.08090","url":"https://dblp.org/rec/journals/corr/MoghadamZ15a"}, "url":"URL#3681836" }, { "@score":"1", "@id":"3681840", "info":{"authors":{"author":[{"@pid":"46/4581","text":"Reza Farrahi Moghaddam"},{"@pid":"82/6513","text":"Yves Lemieux"},{"@pid":"69/4317","text":"Mohamed Cheriet"}]},"title":"40 Gbps Access for Metro networks: Implications in terms of Sustainability and Innovation from an LCA Perspective.","venue":"CoRR","volume":"abs/1504.06262","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoghaddamLC15","ee":"http://arxiv.org/abs/1504.06262","url":"https://dblp.org/rec/journals/corr/MoghaddamLC15"}, "url":"URL#3681840" }, { "@score":"1", "@id":"3681841", "info":{"authors":{"author":[{"@pid":"46/4581","text":"Reza Farrahi Moghaddam"},{"@pid":"82/6513","text":"Yves Lemieux"},{"@pid":"69/4317","text":"Mohamed Cheriet"}]},"title":"A Decentralized Approach to Software-Defined Networks (SDNs).","venue":"CoRR","volume":"abs/1504.07933","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoghaddamLC15a","ee":"http://arxiv.org/abs/1504.07933","url":"https://dblp.org/rec/journals/corr/MoghaddamLC15a"}, "url":"URL#3681841" }, { "@score":"1", "@id":"3681854", "info":{"authors":{"author":[{"@pid":"142/9290","text":"Omer K. Jasim Mohammad"},{"@pid":"69/1365","text":"Safia Abbas"},{"@pid":"18/687","text":"El-Sayed M. El-Horbaty"},{"@pid":"s/ABMSalem","text":"Abdel-Badeeh M. Salem"}]},"title":"Innovative Method for enhancing Key generation and management in the AES-algorithm.","venue":"CoRR","volume":"abs/1504.03406","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohammadAES15a","ee":"http://arxiv.org/abs/1504.03406","url":"https://dblp.org/rec/journals/corr/MohammadAES15a"}, "url":"URL#3681854" }, { "@score":"1", "@id":"3681865", "info":{"authors":{"author":[{"@pid":"133/5268","text":"Ali Moharrer"},{"@pid":"04/1738","text":"Shuangqing Wei"},{"@pid":"91/3099","text":"George T. Amariucai"},{"@pid":"06/6599-1","text":"Jing Deng 0001"}]},"title":"Classifying Unrooted Gaussian Trees under Privacy Constraints.","venue":"CoRR","volume":"abs/1504.02530","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoharrerWAD15","ee":"http://arxiv.org/abs/1504.02530","url":"https://dblp.org/rec/journals/corr/MoharrerWAD15"}, "url":"URL#3681865" }, { "@score":"1", "@id":"3681866", "info":{"authors":{"author":[{"@pid":"146/1072","text":"Eva Mohedano"},{"@pid":"161/8786","text":"Amaia Salvador"},{"@pid":"161/9936","text":"Sergi Porta"},{"@pid":"12/7205","text":"Xavier Giró-i-Nieto"},{"@pid":"10/7458","text":"Graham Healy"},{"@pid":"87/1938","text":"Kevin McGuinness"},{"@pid":"01/2487","text":"Noel E. O'Connor"},{"@pid":"s/AlanFSmeaton","text":"Alan F. Smeaton"}]},"title":"Exploring EEG for Object Detection and Retrieval.","venue":"CoRR","volume":"abs/1504.02356","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MohedanoSPNHMOS15","ee":"http://arxiv.org/abs/1504.02356","url":"https://dblp.org/rec/journals/corr/MohedanoSPNHMOS15"}, "url":"URL#3681866" }, { "@score":"1", "@id":"3681872", "info":{"authors":{"author":[{"@pid":"161/9826","text":"Mohammad Mahdi Mojahedian"},{"@pid":"49/11141","text":"Amin Gohari"},{"@pid":"91/4838","text":"Mohammad Reza Aref"}]},"title":"Perfectly Secure Index Coding.","venue":"CoRR","volume":"abs/1504.04494","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MojahedianGA15","ee":"http://arxiv.org/abs/1504.04494","url":"https://dblp.org/rec/journals/corr/MojahedianGA15"}, "url":"URL#3681872" }, { "@score":"1", "@id":"3681873", "info":{"authors":{"author":[{"@pid":"161/9883","text":"Farshid Mokhtarinezhad"},{"@pid":"39/4721","text":"Jörg Kliewer"},{"@pid":"12/3337","text":"Osvaldo Simeone"}]},"title":"Lossy Compression with Privacy Constraints: Optimality of Polar Codes.","venue":"CoRR","volume":"abs/1504.05616","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MokhtarinezhadK15","ee":"http://arxiv.org/abs/1504.05616","url":"https://dblp.org/rec/journals/corr/MokhtarinezhadK15"}, "url":"URL#3681873" }, { "@score":"1", "@id":"3681900", "info":{"authors":{"author":{"@pid":"53/714","text":"Raul J. Mondragón"}},"title":"Ensembles based on the Rich-Club and how to use them to build soft-communities.","venue":"CoRR","volume":"abs/1504.05782","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Mondragon15","ee":"http://arxiv.org/abs/1504.05782","url":"https://dblp.org/rec/journals/corr/Mondragon15"}, "url":"URL#3681900" }, { "@score":"1", "@id":"3681921", "info":{"authors":{"author":[{"@pid":"80/11047","text":"Nima Monshizadeh"},{"@pid":"88/3996","text":"Claudio De Persis"}]},"title":"Output agreement in networks with unmatched disturbances and algebraic constraints.","venue":"CoRR","volume":"abs/1504.03609","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MonshizadehP15","ee":"http://arxiv.org/abs/1504.03609","url":"https://dblp.org/rec/journals/corr/MonshizadehP15"}, "url":"URL#3681921" }, { "@score":"1", "@id":"3681926", "info":{"authors":{"author":[{"@pid":"83/5094","text":"Andrea Montanari"},{"@pid":"71/3761","text":"Subhabrata Sen"}]},"title":"Semidefinite Programs on Sparse Random Graphs.","venue":"CoRR","volume":"abs/1504.05910","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MontanariS15","ee":"http://arxiv.org/abs/1504.05910","url":"https://dblp.org/rec/journals/corr/MontanariS15"}, "url":"URL#3681926" }, { "@score":"1", "@id":"3681946", "info":{"authors":{"author":[{"@pid":"135/7183","text":"Kevin R. Moon"},{"@pid":"96/3476","text":"Véronique Delouille"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Meta learning of bounds on the Bayes classifier error.","venue":"CoRR","volume":"abs/1504.07116","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoonDH15","ee":"http://arxiv.org/abs/1504.07116","url":"https://dblp.org/rec/journals/corr/MoonDH15"}, "url":"URL#3681946" }, { "@score":"1", "@id":"3681947", "info":{"authors":{"author":[{"@pid":"135/7183","text":"Kevin R. Moon"},{"@pid":"96/3476","text":"Véronique Delouille"},{"@pid":"147/4878","text":"Jimmy J. Li"},{"@pid":"160/9180","text":"Ruben De Visscher"},{"@pid":"147/4988","text":"Fraser Watson"},{"@pid":"h/AlfredOHeroIII","text":"Alfred O. Hero III"}]},"title":"Image patch analysis of sunspots and active regions. II. Clustering via dictionary learning.","venue":"CoRR","volume":"abs/1504.02762","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MoonDLVWH15","ee":"http://arxiv.org/abs/1504.02762","url":"https://dblp.org/rec/journals/corr/MoonDLVWH15"}, "url":"URL#3681947" }, { "@score":"1", "@id":"3681955", "info":{"authors":{"author":[{"@pid":"162/0085","text":"Konda Reddy Mopuri"},{"@pid":"20/6289","text":"R. Venkatesh Babu"}]},"title":"Object Level Deep Feature Pooling for Compact Image Representation.","venue":"CoRR","volume":"abs/1504.06591","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MopuriB15","ee":"http://arxiv.org/abs/1504.06591","url":"https://dblp.org/rec/journals/corr/MopuriB15"}, "url":"URL#3681955" }, { "@score":"1", "@id":"3681978", "info":{"authors":{"author":[{"@pid":"145/0401","text":"Laureano Moreno-Pozas"},{"@pid":"329/4512","text":"Francisco Javier López-Martínez"},{"@pid":"25/6295","text":"José F. Paris"},{"@pid":"66/4692","text":"Eduardo Martos-Naya"}]},"title":"The $κ$-$μ$ Shadowed Fading Model: Unifying the $κ$-$μ$ and $η$-$μ$ Distributions.","venue":"CoRR","volume":"abs/1504.05764","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/Moreno-PozasLPM15","ee":"http://arxiv.org/abs/1504.05764","url":"https://dblp.org/rec/journals/corr/Moreno-PozasLPM15"}, "url":"URL#3681978" }, { "@score":"1", "@id":"3681982", "info":{"authors":{"author":[{"@pid":"17/4688","text":"Veniamin I. Morgenshtern"},{"@pid":"28/932","text":"Emmanuel J. Candès"}]},"title":"Super-Resolution of Positive Sources: the Discrete Setup.","venue":"CoRR","volume":"abs/1504.00717","year":"2015","type":"Informal and Other Publications","access":"open","key":"journals/corr/MorgenshternC15","ee":"http://arxiv.org/abs/1504.00717","url":"https://dblp.org/rec/journals/corr/MorgenshternC15"}, "url":"URL#3681982" } ] } } } )