default search action
CoRR, May 2006
- Chao Tian, Suhas N. Diggavi:
On Multistage Successive Refinement for Wyner-Ziv Source Coding with Degraded Side Informations. - Chao-Yang Pang, Zheng-Wei Zhou, Guang-Can Guo:
A Hybrid Quantum Encoding Algorithm of Vector Quantization for Image Compression. - Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. - Himanshu Thapliyal, M. B. Srinivas:
Novel Reversible Multiplier Architecture Using Reversible TSG Gate. - Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Spasojevic:
The Discrete Memoryless Multiple Access Channel with Confidential Messages. - Shengtian Yang, Peiliang Qiu:
An Information-Spectrum Approach to Multiterminal Rate-Distortion Theory. - Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall, Amin Vahdat:
Systematic Topology Analysis and Generation Using Degree Correlations. - Arnaud Durand, Etienne Grandjean:
The complexity of acyclic conjunctive queries revisited. - Marcus Hutter:
On the Foundations of Universal Sequence Prediction. - Di Wu, Predrag Spasojevic:
Complementary Set Matrices Satisfying a Column Correlation Constraint. - Prosenjit Bose, Vida Dujmovic, Danny Krizanc, Stefan Langerman, Pat Morin, David R. Wood, Stefanie Wuhrer:
A Characterization of the Degree Sequences of 2-Trees. - Luc Steels, Martin Loetzsch:
Perspective alignment in spatial language. - L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan:
Geometric representation of graphs in low dimension. - Yingbin Liang, H. Vincent Poor:
Generalized Multiple Access Channels with Confidential Messages. - Ciro Cattuto, Vittorio Loreto, Luciano Pietronero:
Collaborative Tagging and Semiotic Dynamics. - Yingbin Liang, Venugopal V. Veeravalli:
Cooperative Relay Broadcast Channels. - Phan Huy Tu, Tran Cao Son, Chitta Baral:
Reasoning and Planning with Sensing Actions, Incomplete Information, and Static Causal Laws using Answer Set Programming. - Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan, Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron:
Computational Modeling in Applied Problems: collected papers on econometrics, operations research, game theory and simulation. - Frédéric Chyzak, Michael Drmota, Thomas Klausner, Gerard Kok:
The Distribution of Patterns in Random Trees. - Sergey Alpaev:
Applied MVC Patterns. A pattern language. - Harald Zankl:
SAT Techniques for Lexicographic Path Orders. - Martin Kurth, Jim LeBlanc:
Toward a Collection-based Metadata Maintenance Model. - Ender Tekin, Aylin Yener:
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints. - Shane Legg, Marcus Hutter:
A Formal Measure of Machine Intelligence. - Vytautas Perlibakas:
Face Recognition using Principal Component Analysis and Log-Gabor Filters. - Yuri Pritykin:
Strongly Almost Periodic Sequences under Finite Automata Mappings. - Vytautas Perlibakas:
Recognition of expression variant faces using masked log-Gabor features and Principal Component Analysis. - Ender Tekin, Aylin Yener:
The Gaussian Multiple Access Wire-Tap Channel. - Martin Fürer, Shiva Prasad Kasiviswanathan:
Spanners for Geometric Intersection Graphs. - Randy Cogill, Sanjay Lall:
A Delay Analysis of Maximal Matching Switching with Speedup. - Mihaela Dînsoreanu, Ioan Salomie, Kalman Pusztai:
On the Design of Agent-Based Systems using UML and Extensions. - Tudor Marian, Bogdan Dumitriu, Mihaela Dînsoreanu, Ioan Salomie:
A framework of reusable structures for mobile agent development. - Mihaela Dînsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom Coffey:
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments. - Srinivas Shakkottai, R. Srikant:
Peer to Peer Networks for Defense Against Internet Worms. - Filip Radlinski, Thorsten Joachims:
Query Chains: Learning to Rank from Implicit Feedback. - Filip Radlinski, Thorsten Joachims:
Evaluating the Robustness of Learning from Implicit Feedback. - Filip Radlinski, Thorsten Joachims:
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs. - Tran Cao Son, Enrico Pontelli, Islam Elkabani:
An Unfolding-Based Semantics for Logic Programming with Aggregates. - Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang:
Fast and Generalized Polynomial Time Memory Consistency Verification. - Marcus Hutter:
General Discounting versus Average Reward. - Jian Cao, Edmund M. Yeh:
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting. - (Withdrawn) An unlikely result.
- Stefano Guerrini, Andrea Masini:
Continuations, proofs and tests. - Georg Schmidt, Vladimir Sidorenko:
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length. - R. N. Mohan:
On Orthogonalities in Matrices. - Gil I. Shamir:
Patterns of i.i.d. Sequences and Their Entropy - Part I: General Bounds. - Mokshay M. Madiman, Andrew R. Barron:
Generalized Entropy Power Inequalities and Monotonicity Properties of Information. - S. Roch:
On Learning Thresholds of Parities and Unions of Rectangles in Random Walk Models. - V. M. Siddlenikov, R. N. Mohan, Moon Ho Lee:
On fractionally linear functions over a finite field. - Vikraman Arvind, Piyush P. Kurur:
A Polynomial Time Nilpotence Test for Galois Groups and Related Results. - Chad A. Cole, Stephen G. Wilson, Eric K. Hall, Thomas R. Giallorenzi:
A General Method for Finding Low Error Rates of LDPC Codes. - Yufang Xi, Edmund M. Yeh:
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks. - Hussein Gibbins, Rajkumar Buyya:
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps. - François Lamarche, Lutz Straßburger:
From Proof Nets to the Free *-Autonomous Category. - David Bellot, Pierre Bessière:
Approximate Discrete Probability Distribution Representation using a Multi-Resolution Binary Tree. - Chee Shin Yeo, Marcos Dias de Assunção, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, Rajkumar Buyya:
Utility Computing and Global Grids. - Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya:
SLA-Based Coordinated Superscheduling Scheme and Performance for Computational Grids. - Russell O'Connor:
A Monadic, Functional Implementation of Real Numbers. - Jean-Marc Rosengard, Marian Florin Ursu:
Ontological Representations of Software Patterns. - Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya:
A Case for Cooperative and Incentive-Based Coupling of Distributed Clusters. - Al-Mukaddim Khan Pathan, Md. Abdul Mottalib, Minhaz Fahim Zibran:
An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security. - Al-Mukaddim Khan Pathan, Md. Golam Shagadul Amin Talukder:
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data. - Asif Ahmed Anik, Al-Mukaddim Khan Pathan:
An Electronic Payment System to Ensure Cost Effectiveness with Easy Security Incorporation for the Developing Countries. - Carsten Lutz, Frank Wolter:
Modal Logics of Topological Relations. - Hector Zenil, Francisco Hernández Quiroz:
On the possible Computational Power of the Human Mind. - Xiaowen Zhang, Ke Tang, Li Shu:
A Chaotic Cipher Mmohocc and Its Randomness Evaluation. - Desmond S. Lun:
Efficient Operation of Coded Packet Networks. - Alin Bostan, Frédéric Chyzak, Bruno Salvy, Thomas Cluzeau:
Low Complexity Algorithms for Linear Recurrences. - Nadav Yacov, Hadar Efraim, Haggai Kfir, Ido Kanter, Ori Shental:
Parallel vs. Sequential Belief Propagation Decoding of LDPC Codes over GF(q) and Markov Sources. - Stephen L. Smith, Mireille E. Broucke, Bruce A. Francis:
Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots. - Wei Wu, Sriram Vishwanath, Ari Arapostathis:
On the Capacity of Interference Channels with Degraded Message sets. - Wei Wu, Sriram Vishwanath, Ari Arapostathis:
On the Capacity of Gaussian Weak Interference Channels with Degraded Message sets. - Dionissios T. Hristopulos, Samuel Elogne:
Analytic Properties and Covariance Functions of a New Class of Generalized Gibbs Random Fields. - Michael Codish, Peter Schneider-Kamp, Vitaly Lagoon, René Thiemann, Jürgen Giesl:
SAT Solving for Argument Filterings. - Sebastien de la Kethulle de Ryhove, Ninoslav Marina, Geir E. Øien:
On the Capacity and Mutual Information of Memoryless Noncoherent Rayleigh-Fading Channels. - Jeroen F. J. Laros:
Numeration-automatic sequences. - Taesup Moon, Tsachy Weissman:
Universal Filtering via Hidden Markov Modeling. - Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Dürr, Svetlana A. Kravchenko, Francis Sourd:
The Complexity of Mean Flow Time Scheduling Problems with Release Times. - Amos Lapidoth, Shlomo Shamai, Michèle A. Wigger:
On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information. - Mohamed Ali Kâafar, Thierry Turletti, Walid Dabbous:
A Locating-First Approach for Scalable Overlay Multicast. - Marc Daumas, Guillaume Da Graça, David Defour:
Caractéristiques arithmétiques des processeurs graphiques. - Saugata Basu:
Efficient algorithm for computing the Euler-Poincaré characteristic of a semi-algebraic set defined by few quadratic inequalities. - Partha Basuchowdhuri:
Classical Authentication Aided Three-Stage Quantum Protocol. - Yingbin Liang, H. Vincent Poor:
The Generalized Multiple Access Channel with Confidential Messages. - Nachum Dershowitz, Ziyad Hanna, Alexander Nadel:
A Scalable Algorithm for Minimal Unsatisfiable Core Extraction. - Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor:
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels. - Mustafa Cenk Gursoy:
Error Exponents and Cutoff Rate for Noncoherent Rician Fading Channels. - Ke Liu, Adnan Majeed, Nael B. Abu-Ghazaleh:
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks. - Ke Liu, Nael B. Abu-Ghazaleh:
Aligned Virtual Coordinates for Greedy Routing in WSNs. - Santanu K. Maiti:
A Basic Introduction on Math-Link in Mathematica & the Technique for Running Mathematica Batch files in Background. - Emin Martinian, Martin J. Wainwright:
Low-density constructions can achieve the Wyner-Ziv and Gelfand-Pinsker bounds. - Lawrence Ong, Mehul Motani:
The Multiple Access Channel with Feedback and Correlated Sources. - Lawrence Ong, Mehul Motani:
The Capacity of the Single Source Multiple Relay Single Destination Mesh Network. - Simone Bova, Franco Montagna:
Proof Search in Hajek's Basic Logic. - Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung:
Single-Symbol-Decodable Differential Space-Time Modulation Based on QO-STBC. - Yoann Dieudonné, Franck Petit:
Circle Formation of Weak Robots and Lyndon Words. - Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas:
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols. - Sharon M. Betz, H. Vincent Poor:
Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis. - Michael B. Baer:
Prefix Coding under Siege. - Michael G. Rabbat, Mário A. T. Figueiredo, Robert D. Nowak:
Network Inference from Co-Occurrences. - Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi Ogawa:
Modeling the Dynamics of Social Networks. - Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian, Ke Yi:
Restricted Strip Covering and the Sensor Cover Problem. - Daniel Lemire:
A Better Alternative to Piecewise Linear Time Series Segmentation. - Blake Hegerle:
Parsing Transformative LR(1) Languages. - Chandra Nair, Abbas El Gamal:
An outer bound to the capacity region of the broadcast channel. - Daowen Qiu:
Supervisory Control of Fuzzy Discrete Event Systems: A Formal Approach. - Daowen Qiu, Fuchun Liu:
Fuzzy Discrete Event Systems under Fuzzy Observability and a test-algorithm. - Fuchun Liu, Daowen Qiu, Hongyan Xing, Zhujun Fan:
Diagnosability of Fuzzy Discrete Event Systems. - Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas:
Knowledge Flow Analysis for Security Protocols. - Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel:
Mapping the Bid Behavior of Conference Referees. - Diane Hillmann, Stuart A. Sutton, Jon Phipps, Ryan Laundry:
A Metadata Registry from Vocabularies UP: The NSDL Registry Project. - Marko A. Rodriguez, Johan Bollen:
An Algorithm to Determine Peer-Reviewers. - Johan Bollen, Herbert Van de Sompel:
An Architecture for the Aggregation and Analysis of Scholarly Usage Data. - Abhishek Parakh:
Oblivious Transfer using Elliptic Curves. - Nick S. Jones, Lluis Masanes:
Key Distillation and the Secret-Bit Fraction. - Nan Liu, Sennur Ulukus:
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks. - Seijoon Shim, Chan-Byoung Chae, Robert W. Heath Jr.:
A Lattice-Based MIMO Broadcast Precoder for Multi-Stream Transmission. - Christine A. Kelley, Deepak Sridhara, Joachim Rosenthal:
Pseudocodeword weights for non-binary LDPC codes. - Victor V. Kryssanov, H. Tamaki, K. Ueda:
An Internet-enabled technology to support Evolutionary Design. - Victor V. Kryssanov, H. Tamaki, S. Kitamura:
Understanding Design Fundamentals: How Synthesis and Analysis Drive Creativity, Resulting in Emergence. - Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, Michihiko Minoh:
Communication of Social Agents and the Digital City - A Semiotic Perspective. - Victor V. Kryssanov, Koh Kakusho, Evgeny L. Kuleshov, Michihiko Minoh:
Modeling Hypermedia-Based Communication. - Jaime S. Cardoso:
Classification of Ordinal Data. - Jorge Pérez, Marcelo Arenas, Claudio Gutierrez:
Semantics and Complexity of SPARQL. - Germain Drolet:
Combinational Logic Circuit Design with the Buchberger Algorithm. - David P. Bunde:
Power-aware scheduling for makespan and flow. - Steven Keith, Owen Kaser, Daniel Lemire:
Analyzing Large Collections of Electronic Text Using OLAP. - Alexander Kurz:
Logic Column 15: Coalgebras and Their Logics. - Wei Kang, Sennur Ulukus:
An Outer Bound for the Multi-Terminal Rate-Distortion Region. - Thierry Mora, Olivier Rivoire:
Error Exponents of Low-Density Parity-Check Codes on the Binary Erasure Channel. - Simon P. Morgan:
Notes on Geometric Measure Theory Applications to Image Processing; De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion. - Krzysztof R. Apt, Tadeusz Radzik:
Stable partitions in coalitional games. - Benoit Donnet, Philippe Raoult, Timur Friedman:
Efficient Route Tracing from a Single Source. - Boon-Chong Seet, Bu-Sung Lee, Chiew Tong Lau:
DSR with Non-Optimal Route Suppression for MANETs. - Ron Dabora, Sergio D. Servetto:
On the Role of Estimate-and-Forward with Time-Sharing in Cooperative Communications. - Gerald Bourgeois:
Attaque algebrique de NTRU a l'aide des vecteurs de Witt. - Jun Chen, Venugopal V. Veeravalli:
Capacity Results for Block-Stationary Gaussian Fading Channels with a Peak Power Constraint. - Victor V. Kryssanov, V. A. Abramov, Yoshiro Fukuda, K. Konishi:
The meaning of manufacturing know-how. - Na Li, Wen-Feng Qi:
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity. - Leslie Ann Goldberg, Mark Jerrum:
Inapproximability of the Tutte polynomial. - Amos Korman:
General Compact Labeling Schemes for Dynamic Trees. - Gwenolé Corre, Nathalie Julien, Eric Senn, Eric Martin:
Intégration de la synthèse mémoire dans l'outil de synthèse d'architecture GAUT Low Power. - Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eric Senn, Eric Martin:
High-level synthesis under I/O Timing and Memory constraints. - Gwenolé Corre, Nathalie Julien, Eric Senn, Eric Martin:
A Memory Aware High Level Synthesis Too. - Gwenolé Corre, Eric Senn, Nathalie Julien, Eric Martin:
Memory Aware High-Level Synthesis for Embedded Systems. - Gwenolé Corre, Philippe Coussy, Pierre Bomel, Eric Senn, Eric Martin:
Synthèse Comportementale Sous Contraintes de Communication et de Placement Mémoire pour les composants du TDSI. - Stéphane Huet, Pascale Sébillot, Guillaume Gravier:
Utilisation de la linguistique en reconnaissance de la parole : un état de l'art. - Juan Carlos Cuevas-Tello, Peter Tiño, Somak Raychaudhury:
How accurate are the time delay estimates in gravitational lensing? - Lukasz Bratek, Marcin Kolonko:
An algorithm for solving the pulsar equation. - Martin Weigt, Haijun Zhou:
Message passing for vertex covers. - William Thistleton, John A. Marsh, Kenric P. Nelson, Constantino Tsallis:
Generalized Box-Muller method for generating q-Gaussian random deviates. - Gavriel Segre:
Some elementary rigorous remark about the replica formalism in the Statistical Physics' approach to threshold phenomena in Computational Complexity Theory. - François Rodier:
Borne sur le degré des polynômes presque parfaitement non-linéaires. - Vladimir P. Gerdt, Yuri A. Blinkov, Vladimir V. Mozzhilkin:
Gröbner Bases and Generation of Difference Schemes for Partial Differential Equations. - Nicolas Pouyanne:
An algebraic approach of Polya processes. - Frédéric Dambreville:
Cross-Entropic Learning of a Machine for the Decision in a Partially Observable Universe. - Jose-Luis López, Ricardo López-Ruiz:
The Limit Cycles of Lienard Equations in the Weakly Nonlinear Regime. - Ricardo López-Ruiz, Daniele Fournier-Prunaret:
Three Logistic Models for the Ecological and Economic Interactions: Symbiosis, Predator-Prey and Competition. - Ping Ao:
Laws in Darwinian Evolutionary Theory. - Markus Mueller:
Strongly Universal Quantum Turing Machines and Invariance of Kolmogorov Complexity. - Andreas Jakoby, Maciej Liskiewicz, Aleksander Madry:
Using quantum oblivious transfer to cheat sensitive quantum bit commitment. - Martin J. Wainwright:
Sharp thresholds for high-dimensional and noisy recovery of sparsity. - M. Marvan:
Sufficient set of integrability conditions of an orthonomic system. - Tapan Mukhopadhyay, D. N. Basu:
Isospin asymmetry in nuclei and nuclear symmetry energy. - Jesús A. De Loera, Raymond Hemmecke, Shmuel Onn, Robert Weismantel:
N-Fold Integer Programming. - Yael Berstein, Shmuel Onn:
Nonlinear Bipartite Matching. - Alexander Yu. Vlasov:
Classical simulators of quantum computers and no-go theorems. - Dorit Aharonov, Itai Arad:
The BQP-hardness of approximating the Jones Polynomial. - Jonathan Barrett, Adrian Kent, Stefano Pironio:
Maximally Non-Local and Monogamous Quantum Correlations. - Subhash C. Kak:
Quantum Information and Entropy.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.