Stop the war!
Остановите войну!
for scientists:
default search action
CoRR, August 2011
-
A Invertible Dimension Reduction of Curves on a Manifold. -
Multi-User MIMO Scheduling in the Fourth Generation Cellular Uplink. -
Generating a Diverse Set of High-Quality Clusterings. -
Achievable Rates and Outer Bound for the Half-Duplex MAC with Generalized Feedback. -
Revisiting Degree Distribution Models for Social Graph Analysis. -
CBR with Commonsense Reasoning and Structure Mapping: An Application to Mediation. -
Computing the Permanent with Belief Propagation. -
On the Throughput-Delay Trade-off in Georouting Networks. -
Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels with Spherical Uncertainty. -
Trusted Network Selection using SAW and TOPSIS Algorithms for Heterogeneous Wireless Networks. -
Proceedings Fourth Interaction and Concurrency Experience, ICE 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 59, 2011 [contents] -
Reasoning in the OWL 2 Full Ontology Language using First-Order Automated Theorem Proving. -
Optimization of Lyapunov Invariants in Verification of Software Systems. -
Differentially Private Search Log Sanitization with Optimal Output Utility. -
Probabilistic Analysis of Buffer Starvation in Markovian Queues. -
On the Correctness of Pull-Tabbing. -
BGP Stability is Precarious. -
Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node. -
BQP and PPAD. -
Modelling and Simulation of Asynchronous Real-Time Systems using Timed Rebeca. 1-19 -
A Verified Algebra for Linked Data. 20-33 -
A State-Based Characterisation of the Conflict Preorder. 34-48 -
Predicting global usages of resources endowed with local policies. 49-64 -
Decoupled execution of synchronous coordination models via behavioural automata. 65-79 -
Key Predistribution Schemes for Distributed Sensor Networks. -
FIFA World Cup 2010: A Network Analysis of the Champion Team Play. -
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System. -
Felix: Scaling Inference for Markov Logic with an Operator-based Approach. -
Adaptive Drift Analysis. -
Small witnesses, accepting lassos and winning strategies in omega-automata and games. -
Observational equivalences for linear logic CC languages. -
(Co-)Inductive semantics for Constraint Handling Rules. -
Fuzzy Consensus and Synchronization: Theory and Application to Critical Infrastructure Protection Problems. -
Black-Box Complexities of Combinatorial Problems. -
Entropy Semiring Forward-backward Algorithm for HMM Entropy Computation. -
Cross-moments computation for stochastic context-free grammars. -
Using Java for distributed computing in the Gaia satellite data processing. -
Typesafe Modeling in Text Mining. -
Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traffic. -
On Detecting Pollution Attacks in Inter-Session Network Coding. -
A Comprehensive Study of an Online Packet Scheduling Algorithm. -
The Channel Capacity Increases with Power. -
Exploiting Agent and Type Independence in Collaborative Graphical Bayesian Games. -
Algorithmic complexity of pair cleaning method for k-satisfiability problem. (draft version). -
A Methodology for assessing Agile Software Development Approaches. -
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. -
Sparse Recovery with Graph Constraints: Fundamental Limits and Measurement Construction. -
Innocent strategies as presheaves and interactive equivalences for CCS. 2-24 -
Interaction and observation, categorically. 25-36 -
Structured Operational Semantics for Graph Rewriting. 37-51 -
Polymorphic Endpoint Types for Copyless Message Passing. 52-67 -
On the reaction time of some synchronous systems. 69-83 -
Correlating Formal Semantic Models of Reo Connectors: Connector Coloring and Constraint Automata. 84-103 -
Formal Analysis of Quantum Systems using Process Calculus. 104-110 -
Amending Contracts for Choreographies. 111-129 -
Contracts in distributed systems. 130-147 -
Staging Mixed-Initiative Dialogs by Program Generation and Transformation. -
Asymptotic Analysis of Complex LASSO via Complex Approximate Message Passing (CAMP). -
High-Performance Pseudo-Random Number Generation on Graphics Processing Units. -
A Kalman Decomposition for Possibly Controllable Uncertain Linear Systems. -
Symmetric Connectivity with Directional Antennas. -
Spatial Dynamic Structures and Mobility in Computation. -
An Efficient Real Time Method of Fingertip Detection. -
Universal Rateless Codes From Coupled LT Codes. -
Towards an Optimal Space-and-Query-Time Index for Top-$k$ Document Retrieval. -
On Berry's conjectures about the stable order in PCF. -
A Group Signature Based Electronic Toll Pricing System. -
Proposal for improvement in the transfer and execution of multiple instances of a virtual image. -
[tiger2/]- Serialising the ISO SynAF Syntactic Object Model. -
A characterization of entanglement-assisted quantum low-density parity-check codes. -
Policy Creation Model for Policy-Based Management in Telecommunications Networks. -
Estudo de Viabilidade de uma Plataforma de Baixo Custo para Data Warehouse. -
A Novel Trajectory Clustering technique for selecting cluster heads in Wireless Sensor Networks. -
Enhanced User Authentication through Trajectory Clustering. -
A Hybrid Trajectory Clustering for Predicting User Navigation. -
A Fault Tolerant Trajectory Clustering (FTTC) for selecting cluster heads inWireless Sensor Networks. -
Binary Particle Swarm Optimization based Biclustering of Web usage Data. -
Optimization with Sparsity-Inducing Penalties. -
All good things come in threes - Three beads learn to swim with lattice Boltzmann and a rigid body solver. -
Towards Robust and Efficient Computation in Dynamic Peer-to-Peer Networks. -
Scheduling partially ordered jobs faster than 2^n. -
Towards Spatio-Temporal SOLAP. -
Approximate Bregman near neighbors in sublinear time: Beyond the triangle inequality. -
Searching for Voltage Graph-Based LDPC Tailbiting Codes with Large Girth. -
Towards Optimal Sorting of 16 Elements. -
Noisy-Interference Sum-Rate Capacity for Vector Gaussian Interference Channels. -
Evader Interdiction and Collateral Damage. -
UWB Array Design Using Variable Zo Technology and Central Force Optimization. -
Optimal Base Station Placement: A Stochastic Method Using Interference Gradient In Downlink Case. -
On the performance of high-order finite elements with respect to maximum principles and the non-negative constraint for diffusion-type equations. -
Network Localization on Unit Disk Graphs. -
Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization. -
Turing degrees of multidimensional SFTs. -
Information Complexity and Estimation. -
On strong homogeneity of two global optimization algorithms based on statistical models of multimodal objective functions. -
A Data Mining Approach to the Diagnosis of Tuberculosis by Cascading Clustering and Classification. -
Wireless Capacity With Arbitrary Gain Matrix. -
Conauto-2.0: Fast Isomorphism Testing and Automorphism Group Computation. -
Onset of coherent attitude layers in a population of sports fans. -
On the scalability and convergence of simultaneous parameter identification and synchronization of dynamical systems. -
Distributed Assessment of Network Centrality. -
Stateful Testing: Finding More Errors in Code and Contracts. -
On Two-generated Non-commutative Algebras Subject to the Affine Relation. -
Analysis, Dimensioning and Robust Control of Shunt Active Filter for Harmonic Currents Compensation in Electrical Mains. -
Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition. -
Improved Analysis for Graphic TSP Approximation via Matchings. -
Capacity Region of Vector Gaussian Interference Channels with Generally Strong Interference. -
Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation. -
The Impact of Information Technology in Nigeria's Banking Industry. -
Development of a Window Based Security System for Electronic Data Interchange. -
On generic erasure correcting sets and related problems. -
Learning Representations by Maximizing Compression. -
Combinatorial Algorithms for Capacitated Network Design. -
An index for regular expression queries: Design and implementation. -
Unilateral Altruism in Network Routing Games with Atomic Players. -
Multi-channel Hybrid Access Femtocells: A Stochastic Geometric Analysis. -
1st International Workshop on Complex Systems in Sports - Proceedings. -
Solving Detachability Problem for the Polynomial Ring by Signature-based Groebner Basis Algorithms. -
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge. -
Security Model For Service-Oriented Architecture. -
Compressed Matrix Multiplication. -
Accurate location estimation of moving object with energy constraint & adaptive update algorithms to save data. -
Three-term Method and Dual Estimate on Static Problems of Continuum Bodies. -
Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model. -
Two-stage coordination multi-radio multi-channel mac protocol for wireless mesh networks. -
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service. -
Architecture Of A Identity Based Firewall System. -
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms. -
Fast k-means algorithm clustering. -
Program slicing techniques and its applications. -
Real time face recognition using adaboost improved fast PCA algorithm. -
Variability of location management costs with different mobilities and timer periods to update locations. -
Savings in location management costs leveraging user statistics. -
Sparsity without the Complexity: Loss Localisation using Tree Measurements. -
An Efficient Architecture for Information Retrieval in P2P Context Using Hypergraph. -
Distributed Detection over Noisy Networks: Large Deviations Analysis. -
A Novel Header Matching Algorithm for Intrusion Detection Systems. -
Non-uniform cellular automata and distributions of rules. -
On the Secrecy Degrees of Freedom of Multi-Antenna Wiretap Channels with Delayed CSIT. -
A Driven Backup Routing Table to Find Alternative Dijoint Path in Ad Hoc Wireless. -
Efficient Algorithms to Enhance Recovery Schema in Link State Protocols. -
A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network. -
Weak Dominance Drawings and Linear Extension Diameter. -
Spatial Degrees of Freedom of the Multicell MIMO Multiple Access Channel. -
Impact of Software Requirement Volatility Pattern on Project Dynamics: Evidences from a Case Study. -
Proceedings First International Workshop on Process Algebra and Coordination, PACO 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 60, 2011 [contents] -
Non-cooperative Game For Capacity Offload. -
Need to understand "Uncertainty Assessment" in the system development modeling process. -
On a New Multicomputer Interconnection Topology for Massively Parallel Systems. -
Tactile feedback as a sensory subtraction technique in haptics for needle insertion. -
System Support for Managing Invalid Bindings. -
Collision-resistant hash function based on composition of functions. -
Applying Algebraic Specifications on Digital Right Management Systems. -
A New Algorithmic Scheme for Computing Characteristic Sets. -
'Just Enough' Ontology Engineering. -
Knowledge Audit Framework. -
Gender Recognition Based on Sift Features. -
Generalized Louvain Method for Community Detection in Large Networks. -
Wireless MIMO Switching with Zero-forcing Relaying and Network-coded Relaying. -
Evolving A-Type Artificial Neural Networks. -
Robust Coding for Lossy Computing with Receiver-Side Observation Costs. -
A frequency approach to topological identification and graphical modeling. -
A Stochastic Calculus for Network Systems with Renewable Energy Sources. -
k-Capture in Multiagent Pursuit Evasion, or the Lion and the Hyenas. -
Optimal Rate for Irregular LDPC Codes in Binary Erasure Channel. -
Imitation of Life: Advanced system for native Artificial Evolution. -
Multilayer Approach to Defend Phishing Attacks. -
Load Balancing for MapReduce-based Entity Resolution. -
A new embedding quality assessment method for manifold learning. -
A joint time-invariant filtering approach to the linear Gaussian relay problem. -
Sub-modularity and Antenna Selection in MIMO systems. -
Algebraic Approach to Physical-Layer Network Coding. -
Entropy Density and Mismatch in High-Rate Scalar Quantization with Renyi Entropy Constraint. -
Efficient Sum-Based Hierarchical Smoothing Under \ell_1-Norm. -
Randomized Strategyproof Mechanisms for Facility Location and the Mini-Sum-of-Squares Objective. -
G-NetMon: A GPU-accelerated Network Performance Monitoring System for Large Scale Scientific Collaborations. -
Why Philosophers Should Care About Computational Complexity. -
-
Towards reduction of Paradigm coordination models. 1-18 -
Input-output Conformance Testing for Channel-based Service Connectors. 19-35 -
A Process Algebra for Supervisory Coordination. 36-55 -
Parameterized Verification of Safety Properties in Ad Hoc Network Protocols. 56-65 -
Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Process Calculi. 66-75 -
Turbo Lattices: Construction and Performance Analysis. -
Technical Report: Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks. -
Rule-based Construction of Matching Processes. -
Computing a Maximal Independent Set Using Beeps. -
HybridNN: Supporting Network Location Service on Generalized Delay Metrics. -
An Achievable Rate Region for Cognitive Radio Channel With Common Message. -
An Optimization-Based Model for Full-body Reaching Movements. -
Factorization-based Lossless Compression of Inverted Indices. -
A Concise Query Language with Search and Transform Operations for Corpora with Multiple Levels of Annotation. -
Dynamic Index Coding for Wireless Broadcast Networks. -
Succinct Representations of Permutations and Functions. -
A Knowledge Mining Model for Ranking Institutions using Rough Computing with Ordering Rules and Formal Concept analysis. -
A Distributed Newton Approach for Joint Multi-Hop Routing and Flow Control: Theory and Algorithm. -
Resource Allocation with Costly Participation. -
Efficient computation of the branching structure of an algebraic curve. -
A novel and scalable Multigrid algorithm for many-core architectures. -
Uncertain Nearest Neighbor Classification. -
Witness Rectangle Graphs. -
How to Cover a Point Set with a V-Shape of Minimum Width. -
Can User-Level Probing Detect and Diagnose Common Home-WLAN Pathologies? -
Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly. -
Proceedings 7th International Workshop on Automated Specification and Verification of Web Systems, WWV 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 61, 2011 [contents] -
On the Structure of Weakly Acyclic Games. -
A Comparative Study of Various Routing Protocols in VANET. -
Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network. -
Reputation-based Incentive Protocols in Crowdsourcing Applications. -
Privacy Preserving Data Aggregation in Wireless Sensor Networks. -
Context Protecting Privacy Preservation in Ubiquitous Computing. -
The Ditmarsch Tale of Wonders. -
Multi-Modal Local Sensing and Communication for Collective Underwater Systems. -
User Awareness Measurement Through Social Engineering. -
Governing Information Security in Conjunction with COBIT and ISO 27001. -
Digital Forensics Analysis of Spectral Estimation Methods. -
Spectral Estimation Methods Comparison and Performance Analysis on a Steganalysis Application. -
Analysis and Implementation of Distinct Steganographic Methods. -
Optimal Indexes for Sparse Bit Vectors. -
Partner selection in indoor-to-outdoor cooperative networks: an experimental study. -
On Noncoherent Fading Relay Channels at High SNR. -
Graph and Election Problems Parameterized by Feedback Set Numbers. -
Smart Meter Privacy: A Utility-Privacy Framework. -
Competitive Privacy in the Smart Grid: An Information-theoretic Approach. -
A survey on independence-based Markov networks learning. -
Embedded Model Control approach to robust control. -
A theorem proving framework for the formal verification of Web Services Composition. 1-16 -
Specification and Verification of Context-dependent Services. 17-33 -
Product Lines for Service Oriented Applications - PL for SOA. 34-48 -
Automated Functional Testing based on the Navigation of Web Applications. 49-65 -
Debugging of Web Applications with Web-TLR. 66-80 -
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language. 81-95 -
A type checking algorithm for qualified session types. 96-114 -
Maximal Structuring of Acyclic Process Models. -
Width-parameterized SAT: Time-Space Tradeoffs. -
A New System Architecture for Pervasive Computing. -
Binary Error Correcting Network Codes. -
Deciding Regularity of Hairpin Completions of Regular Languages in Polynomial Time. -
Sequential Auctions and Externalities. -
Enhanced public key security for the McEliece cryptosystem. -
Grothendieck-type inequalities in combinatorial optimization. -
Undithering using linear filtering and non-linear diffusion techniques. -
Cryptovirology: Virus Approach. -
Feature Extraction for Change-Point Detection using Stationary Subspace Analysis. -
Lexicographic products and the power of non-linear network coding. -
Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study. -
A Minimax Linear Quadratic Gaussian Method for Antiwindup Control Synthesis. -
Efficient Multicore Collaborative Filtering. -
Tensor-Based Link Prediction in Intermittently Connected Wireless Networks. -
Tight bounds for the space complexity of nonregular language recognition by real-time machines. -
Compressive Imaging using Approximate Message Passing and a Markov-Tree Prior. -
Classification of Emergency Scenarios. -
Data Accuracy Model for Distributed Clustering Algorithm based on Spatial Data Correlation in Wireless Sensor Networks. -
Novel hybrid intrusion detection system for clustered wireless sensor network. -
Improving bit-vector representation of points-to sets using class hierarchy. -
Gabor frames with rational density. -
Efficient Query Rewrite for Structured Web Queries. -
It was twenty years ago today ... -
Attacks on Local Searching Tools. -
Building Better Incentives for Robustness in BitTorrent. -
The BitTorrent Anonymity Marketplace. -
Compressed Encoding for Rank Modulation. -
Structured Learning of Two-Level Dynamic Rankings. -
The Meaning of Structure in Interconnected Dynamic Systems. -
Absoluteness of subword inequality is undecidable. -
Vehicular Ad Hoc and Sensor Networks; Principles and Challenges. -
Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks. -
Proceedings Eight Workshop on Structural Operational Semantics 2011, SOS 2011, Aachen, Germany, 5th September 2011. EPTCS 62, 2011 [contents] -
The Information Flow and Capacity of Channels with Noisy Feedback. -
Bounds on the Achievable Rate of Noisy feedback Gaussian Channels under Linear Feedback Coding Scheme. -
New Risk Modeling Method for Robust Learning on Smaller Samples. -
Weighted reciprocity in human communication networks. -
Energy Minimization for the Half-Duplex Relay Channel with Decode-Forward Relaying. -
A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications. -
Capacity of Strong and Very Strong Gaussian Interference Relay-without-delay Channels. -
Optimal Power Allocation for OFDM-Based Wire-Tap Channels with Arbitrarily Distributed Inputs. -
Generalized Distributive Law for ML Decoding of STBCs. -
Some Problems in Automata Theory Which Depend on the Models of Set Theory. -
Conscious Machines and Consciousness Oriented Programming. -
Structure Theorems for Real-Time Variable-Rate Coding With and Without Side Information. -
Reduced-Complexity Decoder of Long Reed-Solomon Codes Based on Composite Cyclotomic Fourier Transforms. -
User Scheduling for Heterogeneous Multiuser MIMO Systems: A Subspace Viewpoint. -
Edge Transitive Ramanujan Graphs and Highly Symmetric LDPC Good Codes. -
Symmetric Group Testing and Superimposed Codes. -
A First Approach on Modelling Staff Proactiveness in Retail Simulation Models. -
Equilibria und weiteres Heiteres II. -
-
Training Logistic Regression and SVM on 200GB Data Using b-Bit Minwise Hashing and Comparisons with Vowpal Wabbit (VW). -
Selectivity in Probabilistic Causality: Drawing Arrows from Inputs to Stochastic Outputs. -
Upward Point Set Embeddability for Convex Point Sets is in $P$. -
Cooperative Packet Routing using Mutual Information Accumulation. -
Axiomatizing GSOS with Predicates. 1-15 -
Formal Component-Based Semantics. 17-29 -
Regular Expression Matching and Operational Semantics. 31-45 -
On the Unification of Process Semantics: Logical Semantics. 47-61 -
Sampling based on timing: Time encoding machines on shift-invariant subspaces. -
Stability Conditions for Online Learnability. -
On the average sensitivity of laced Boolean functions. -
Modeling and frequency domain analysis of nonlinear compliant joints for a passive dynamic swimmer. -
An Optimal Control Approach for the Persistent Monitoring Problem. -
Randomized Optimal Consensus of Multi-agent Systems. -
Multi-agent Robust Consensus: Convergence Analysis and Application. -
Comparing System Dynamics and Agent-Based Simulation for Tumour Growth and its Interactions with Effector Cells. -
Information Centric Networking based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks. -
Multi-robot Deployment From LTL Specifications with Reduced Communication. -
The Statistical methods of Pixel-Based Image Fusion Techniques. -
Advanced phase retrieval: maximum likelihood technique with sparse regularization of phase and amplitude. -
Finding Similar/Diverse Solutions in Answer Set Programming. -
Self-Adjusting Stack Machines. -
On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster. -
Reiter's Default Logic Is a Logic of Autoepistemic Reasoning And a Good One, Too. -
Revisiting Epistemic Specifications. -
Origins of Answer-Set Programming - Some Background And Two Personal Accounts. -
Simple Low-Rate Non-Binary LDPC Coding for Relay Channels. -
-
A Machine Learning Perspective on Predictive Coding with PAQ. -
Bounding Procedures for Stochastic Dynamic Programs with Application to the Perimeter Patrol Problem. -
Structure from Local Optima: Learning Subspace Juntas via Higher Order PCA. -
Patterns for Business-to-consumer E-Commerce Applications. -
Exact Reconstruction Conditions for Regularized Modified Basis Pursuit. -
A General Achievable Rate Region for Multiple-Access Relay Channels and Some Certain Capacity Theorems. -
Gadgets and Anti-gadgets Leading to a Complexity Dichotomy. -
Hybrid 3-D Formation Control for Unmanned Helicopters. -
Proceedings 8th International Conference Words 2011, Prague, Czech Republic, 12-16th September 2011. EPTCS 63, 2011 [contents] -
Randomized Algorithms for Tracking Distributed Count, Frequencies, and Ranks. -
Frequency-Hopping Sequence Sets With Low Average and Maximum Hamming Correlation. -
The Exponent of a Polarizing Matrix Constructed from the Kronecker Product. -
Biologically Inspired Process Calculi, Petri Nets and Membrane Computing. -
Reversibility in Massive Concurrent Systems. -
Petri Nets and Bio-Modelling - and how to benefit from their synergy. -
A Testing Framework for P Systems. -
A Spatial Calculus of Wrapped Compartments. -
Brane Calculi Systems: A Static Preview of their Possible Behaviour. -
Synchronization of P Systems with Simplex Channels. -
Further Results on Languages of Membrane Structures. -
Generalized Communicating P Systems Working in Fair Sequential Model. -
Abstracting Asynchronous Multi-Valued Networks: An Initial Investigation. -
Multiscale Modelling: A Mobile Membrane Approach. -
Modelling of Genetic Regulatory Mechanisms with GReg. -
Premise Selection for Mathematics by Corpus Analysis and Kernel Methods. -
A Multiagent Simulation for Traffic Flow Management with Evolutionary Optimization. -
Structured Sparsity and Generalization. -
A Novel and Robust Evolution Algorithm for Optimizing Complicated Functions. -
New separation between $s(f)$ and $bs(f)$. -
-
Hamiltonian Streamline Guided Feature Extraction with Applications to Face Detection. -
A theory of robust software synthesis. -
Secure Lossy Transmission of Vector Gaussian Sources. -
Applications of Zigzag Persistence to Topological Data Analysis. -
SparseAssembler2: Sparse k-mer Graph for Memory Efficient Genome Assembly. -
Proceedings of the 5th Workshop on Membrane Computing and Biologically Inspired Process Calculi (MeCBIC 2011). -
Gaussian Channel with Noisy Feedback and Peak Energy Constraint. -
Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel. -
Hierarchical Object Parsing from Noisy Point Clouds. -
Feature Reinforcement Learning In Practice. -
Interactions between Digital Geometry and Combinatorics on Words. 1-12 -
Infinite permutations vs. infinite words. 13-19 -
Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions. 22-29 -
Circular words and applications. 31-36 -
Finite-Repetition threshold for infinite ternary words. 37-43 -
Uniformly balanced words with linear complexity and prescribed letter frequencies. 44-52 -
Pattern 1^j0^i avoiding binary words. 53-64 -
Pattern Avoidability with Involution. 65-70 -
Recurrent Partial Words. 71-82 -
Monoids and Maximal Codes. 83-92 -
Bounded Parikh Automata. 93-102 -
From Regular to Strictly Locally Testable Languages. 103-111 -
Substitutions over infinite alphabet generating (-β)-integers. 115-121 -
Dynamical generalizations of the Lagrange spectrum. 122-128 -
A Classification of Trapezoidal Words. 129-137 -
On Pansiot Words Avoiding 3-Repetitions. 138-146 -
A new proof for the decidability of D0L ultimate periodicity. 147-151 -
The complexity of tangent words. 152-157 -
Unambiguous 1-Uniform Morphisms. 158-167 -
Constructing Premaximal Binary Cube-free Words of Any Level. 168-178 -
Abelian returns in Sturmian words. 179-188 -
Information theory: Sources, Dirichlet series, and realistic analyses of data structures. 199-214 -
Systems of Word Equations and Polynomials: a New Approach. 215-225 -
Word posets, with applications to Coxeter groups. 226-230 -
Optimizing Properties of Balanced Words. 240-246 -
On the Delone property of (-β)-integers. 247-256 -
Permutation complexity of the fixed points of some uniform binary morphisms. 257-264 -
Permutation Complexity Related to the Letter Doubling Map. 265-276 -
Coordination using Implicit Communication. -
Constructing minimal phylogenetic networks from softwired clusters is fixed parameter tractable. -
AIG Rewriting Using 5-Input Cuts. -
Substring Range Reporting. -
Model of skyscraper evacuation with the use of space symmetry and fluid dynamic approximation. -
Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols. -
Identifying Design Requirements for Wireless Routing Link Metrics. -
Evaluating Impact of Mobility on Wireless Routing Protocols. -
-
On Distribution Preserving Quantization. -
-
Computational Models of Certain Hyperspaces of Quasi-metric Spaces. -
The Multiplexing Gain of the Network MIMO Channel With Distributed CSI. -
On Quasi-Cyclic Codes as a Generalization of Cyclic Codes. -
On the Intersection of All Critical Sets of a Unicyclic Graph. -
Self-Organizing Mixture Networks for Representation of Grayscale Digital Images. -
Asymptotically Optimal Downlink Scheduling over Markovian Fading Channels. -
Policy Iteration is well suited to optimize PageRank. -
Scaling Laws and Design Principles for Multi-Cellular Wireless OFDMA Systems. -
Coding in the Presence of Semantic Value of Information: Unequal Error Protection Using Poset Decoders. -
Using Inverse lambda and Generalization to Translate English to Formal Languages. -
Language understanding as a step towards human level intelligence - automatizing the construction of the initial dictionary from example sentences. -
Solving puzzles described in English by automated translation to answer set programming and learning how to do that translation. -
A SWAR Approach to Counting Ones. -
The Diversity Potential of Relay Selection with Practical Channel Estimation. -
Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Storage. -
Hamming Weights in Irreducible Cyclic Codes. -
The inconsistency of the h-index. -
City on the Sky: Flexible, Secure Data Sharing on the Cloud. -
A Design Methodology for Folded, Pipelined Architectures in VLSI Applications using Projective Space Lattices. -
Implicit learning of object geometry by reducing contact forces and increasing smoothness. -
Three-dimensional Torques and Power of Horse Forelimb Joints at Trot. -
Finding Community Structure with Performance Guarantees in Complex Networks. -
Multihop Adjustment for the Number of Nodes in Contention-Based MAC Protocols for Wireless Ad hoc Networks. -
Extracting, Transforming and Archiving Scientific Data. -
A graphical environment to express the semantics of control systems. -
Query Expansion: Term Selection using the EWC Semantic Relatedness Measure. -
More Jabber about the Collatz Conjecture and a Closed Form for Detecting Cycles on Special Subsequences [Assertion: Collatz cycles]. -
Backpressure with Adaptive Redundancy (BWAR). -
Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography. -
Proceedings 18th International Workshop on Expressiveness in Concurrency, EXPRESS 2011, Aachen, Germany, 5th September 2011. EPTCS 64, 2011 [contents] -
Toward Parts-Based Scene Understanding with Pixel-Support Parts-Sparse Pictorial Structures. -
Convergence Properties of Two (μ + λ) Evolutionary Algorithms On OneMax and Royal Roads Test Functions. -
Convergence of a Recombination-Based Elitist Evolutionary Algorithm on the Royal Roads Test Function. -
OSD: A Source Level Bug Localization Technique Incorporating Control Flow and State Information in Object Oriented Program. -
A Deterministic Equivalent for the Analysis of Non-Gaussian Correlated MIMO Multiple Access Channels. -
Multisensor Images Fusion Based on Feature-Level. -
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security. -
Performance of P2P Networks with Spatial Interactions of Peers. -
The Information Flow Framework: A Descriptive Category Metatheory. -
Complex-Valued Autoencoders. -
QoS Routing using OLSR with Optimization for Flooding. -
Modeling Smart Grid using Generalized Stochastic Petri Net. -
Dynamic Pricing with Limited Supply. -
On the Network-Wide Gain of Memory-Assisted Source Coding. -
Computational Complexity of Cyclotomic Fast Fourier Transforms over Characteristic-2 Fields. -
A New Enforcement on Declassification with Reachability Analysis. -
Biomimetic use of genetic algorithms. -
Prismatic Algorithm for Discrete D.C. Programming Problems. -
A Dynamical Systems Approach for Static Evaluation in Go. -
On Sequences with a Perfect Linear Complexity Profile. -
Research on Wireless Multi-hop Networks: Current State and Challenges. -
Comparison Of The Consumption Of Resources Between HTTP And SIP. -
Coquet: a Coq library for verifying hardware. -
Symmetric Properties and Subspace Degradations of Linear Operator Channels over Finite Fields. -
Detection and emergence. -
Why is language well-designed for communication? (Commentary on Christiansen and Chater: 'Language as shaped by the brain'). -
Edge detection based on morphological amoebas. -
Complexity of a Single Face in an Arrangement of s-Intersecting Curves. -
Lagrangian Relaxation Applied to Sparse Global Network Alignment. -
The relationship between acquaintanceship and coauthorship in scientific collaboration networks. -
Formalization of Abstract State Transition Systems for SAT. -
Tight Bounds on the Optimization Time of the (1+1) EA on Linear Functions. -
On Compressing Permutations and Adaptive Sorting. -
Exploiting the Passive Dynamics of a Compliant Leg to Develop Gait Transitions. -
Taking the Final Step to a Full Dichotomy of the Possible Winner Problem in Pure Scoring Rules. -
Manipulation Can Be Hard in Tractable Voting Systems Even for Constant-Sized Coalitions. -
SNF Project Locomotion: Final report 2009-2010. -
SNF Project Locomotion: Progress report 2008-2009. -
Magneto-mechanical actuation model for fin-based locomotion. -
Linear Complexity of Ding-Helleseth Generalized Cyclotomic Binary Sequences of Any Order. -
Graphical representation of covariant-contravariant modal formulae. 1-15 -
Information Flow Safety in Multiparty Sessions. 16-30 -
Read Operators and their Expressiveness in Process Algebras. 31-43 -
Soft Session Types. 59-73 -
Linearization of CIF Through SOS. 74-88 -
Synchrony vs Causality in the Asynchronous Pi-Calculus. 89-103 -
A Logic with Reverse Modalities for History-preserving Bisimulations. 104-118 -
Synchrony vs. Causality in Asynchronous Petri Nets. 119-131 -
Coordinated Beamforming for Multiuser MISO Interference Channel under Rate Outage Constraints. -
An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes. -
The Parametric Solution of Underdetermined linear ODEs. -
Parameterized Complexity of MaxSat Above Average. -
Trading Order for Degree in Creative Telescoping. -
Scalable Continual Top-k Keyword Search in Relational Databases. -
Population Scalability Analysis of Abstract Population-based Random Search: Spectral Radius. -
The fuzzy gene filter: A classifier performance assesment. -
Language Support for Declarative Future Commitments. -
Ant Colony Optimization of Rough Set for HV Bushings Fault Detection. -
Improving the performance of the ripper in insurance risk classification : A comparitive study using feature selection. -
Optimal Algorithms for Ridge and Lasso Regression with Partially Observed Attributes. -
Automatically Creating Design Models from 3D Anthropometry Data. -
XML content warehousing: Improving sociological studies of mailing lists and web data. -
Capacitated Domination: Constant Factor Approximation for Planar Graphs. -
On commutativity of quantum weakest preconditions. -
Artificial Neural Network and Rough Set for HV Bushings Condition Monitoring. -
-
Category-Based Routing in Social Networks: Membership Dimension and the Small-World Phenomenon (Short). -
Least Squares Temporal Difference Actor-Critic Methods with Applications to Robot Motion Control. -
Hardness of Approximate Compaction for Nonplanar Orthogonal Graph Drawings. -
Stepping Lazy Programs. -
The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks with ARQ. -
Self-Optimized OFDMA via Multiple Stackelberg Leader Equilibrium. -
Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction. -
Differential properties of functions x -> x^{2^t-1} -- extended version. -
A Classification Framework for Web Browser Cross-Context Communication. -
A fast algorithm for reversion of power series. -
Supervised Rank Aggregation for Predicting Influence in Networks. -
Constraint Satisfaction Problems Parameterized Above or Below Tight Bounds: A Survey. -
dynPARTIX - A Dynamic Programming Reasoner for Abstract Argumentation. -
Some Measurements of Nullable and Non-Nullable Parameter Declarations in Relation to Software Malleability. -
Publication patterns of award-winning forest scientists and implications for the ERA journal ranking. -
Simplicity Effects in the Experience of Near-Miss. -
Algorithms for integrals of holonomic functions over domains defined by polynomial inequalities. -
Emotion in good luck and bad luck: predictions from simplicity theory. -
A structural model of intuitive probability. -
Computing with Logic as Operator Elimination: The ToyElim System. -
Numerical extraction of a macroscopic pde and a lifting operator from a lattice Boltzmann model. -
Making Use of Advances in Answer-Set Programming for Abstract Argumentation Systems. -
Non-trivial two-armed partial-monitoring games are bandits. -
Algorithms for the Problems of Length-Constrained Heaviest Segments. -
On the Spatial Dependence Structure of Isotropic Pairwise Gaussian-Markov Random Field Models. -
Synthesis of anisotropic suboptimal controllers via convex optimization. -
A $(k + 3)/2$-approximation algorithm for monotone submodular maximization over a $k$-exchange system. -
Verbal Characterization of Probabilistic Clusters using Minimal Discriminative Propositions. -
Une analyse basée sur la S-DRT pour la modélisation de dialogues pathologiques. -
Event in Compositional Dynamic Semantics. -
Robust Stackelberg game in communication systems. -
Encoding Phases using Commutativity and Non-commutativity in a Logical Framework. -
Orthonormal Expansion ℓ1-Minimization Algorithms for Compressed Sensing. -
On the Quality of Wireless Network Connectivity. -
A Non-Standard Semantics for Kahn Networks in Continuous Time. -
RBO Protocol: Broadcasting Huge Databases for Tiny Receivers. -
Minimalist Grammars and Minimalist Categorial Grammars, definitions toward inclusion of generated languages. -
Improved Linear Programming Bounds on Sizes of Constant-Weight Codes. -
A convex formulation of strict anisotropic norm bounded real lemma. -
To Switch or Not To Switch: Understanding Social Influence in Recommender Systems. -
CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. -
Deinterleaving Finite Memory Processes via Penalized Maximum Likelihood. -
Optimal Coalition Structures in Graph Games. -
Single-trial EEG Discrimination between Wrist and Finger Movement Imagery and Execution in a Sensorimotor BCI. -
A Frequent Closed Itemsets Lattice-based Approach for Mining Minimal Non-Redundant Association Rules. -
Transfer of semantics from argumentation frameworks to logic programming A preliminary report. -
Log-supermodular functions, functional clones and counting CSPs. -
Checking Finite State Machine Conformance when there are Distributed Observations. -
Solving Principal Component Pursuit in Linear Time via $l_1$ Filtering. -
Confluent Hasse diagrams. -
Un metodo estable para la evaluacion de la complejidad algoritmica de cadenas cortas. -
A parametric-complexity exact 3-(UN)COLORING Algorithm. -
Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet. -
On the Linear Scaling of Stochastic Performance Bounds in Network Calculus. -
Unit Testing in ASPIDE. -
A Uniform Fixpoint Approach to the Implementation of Inference Methods for Deductive Databases. -
Deciding first order logic properties of matroids. -
Personalized Web Services for Web Information Extraction. -
Quality Evaluation of Conceptual Level Object Multidimensional Data Model. -
New Results on the Fault-Tolerant Facility Placement Problem. -
Distributed Power Control and Coding-Modulation Adaptation in Wireless Networks using Annealed Gibbs Sampling. -
The Dimension of Subcode-Subfields of Shortened Generalized Reed Solomon Codes. -
Improving Ranking Using Quantum Probability. -
Green Cellular Networks: A Survey, Some Research Issues and Challenges. -
Geographic Trough Filling for Internet Datacenters. -
Formulation and Development of a Novel Quaternary Algebra. -
A Note on Separable Nonlinear Least Squares Problem. -
Strategic Learning and Robust Protocol Design for Online Communities with Selfish Users. -
The update complexity of selection and related problems. -
An Anti-attack Model Based on Complex Network Theory in P2P networks. -
Multi-Robot Organisms: State of the Art. -
Instantons causing iterative decoding to cycle. -
Parsing Combinatory Categorial Grammar with Answer Set Programming: Preliminary Report. -
Getting Beyond the State of the Art of Information Retrieval with Quantum Theory. -
FdConfig: A Constraint-Based Interactive Product Configurator. -
A Performance Study of Data Mining Techniques: Multiple Linear Regression vs. Factor Analysis. -
Implementing Equational Constraints in a Functional Language. -
Modification of GTD from Flat File Format to OLAP for Data Mining. -
Optimization of Lyapunov Invariants in Verification of Software Systems (Extended Version). -
Multi-Robot Searching Algorithm Using Levy Flight and Artificial Potential Field. -
Nested HEX-Programs. -
Collective Adaptive Systems: Challenges Beyond Evolvability. -
A prototype of a knowledge-based programming environment. -
Datum-Wise Classification: A Sequential Approach to Sparsity. -
Learning Valuation Functions. -
Web Pages Clustering: A New Approach. -
E- Learning: An effective pedagogical tool for learning. -
Sliding Trellis-Based Frame Synchronization. -
Consistent Reconstruction of the Input of an Oversampled Filter Bank From Noisy Subbands. -
Generalized Fast Approximate Energy Minimization via Graph Cuts: Alpha-Expansion Beta-Shrink Moves. -
On the enumerating series of an abstract numeration system. -
Structure Selection from Streaming Relational Data. -
Conjugate Variables as a Resource in Signal and Image Processing. -
On the Stability of Linear Discrete-Time Fuzzy Systems. -
Optimal k-fold colorings of webs and antiwebs. -
Each normal logic program has a 2-valued Minimal Hypotheses semantics. -
Food Redistribution as Optimization. -
Probability Ranking in Vector Spaces. -
The $k$-error linear complexity distribution for $2^n$-periodic binary sequences. -
A Constraint Logic Programming Approach for Computing Ordinal Conditional Functions. -
Fast N-body Simulations on GPUs. -
Banded Householder representation of linear subspaces. -
Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction. -
Translating Answer-Set Programs into Bit-Vector Logic. -
A Rejoinder on Energy versus Impact Indicators. -
Show Me Your Cookie And I Will Tell You Who You Are. -
Designing Exchange for Online Communities. -
Spread Decoding in Extension Fields. -
Coordinating Interfering Transmissions in Cooperative Wireless LANs. -
Edge-preserving self-healing: keeping network backbones densely connected. -
Information Dissemination in Unknown Radio networks with Large Labels. -
Proof System for Plan Verification under 0-Approximation Semantics. -
Emotional Analysis of Blogs and Forums Data. -
Efficient Computation of Newton Polytopes of Specialized Resultants. -
Characterization and exploitation of community structure in cover song networks. -
Domain-specific Languages in a Finite Domain Constraint Programming System. -
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks. -
Improving Entity Resolution with Global Constraints. -
Balancing Degree, Diameter and Weight in Euclidean Spanners. -
-
Optimal Deterministic Polynomial-Time Data Exchange for Omniscience. -
Optimizing Network Topology to Reduce Aggregate Traffic in Systems of Mobile Robots. -
No Internal Regret via Neighborhood Watch. -
Proceedings Second Workshop on Logics for Component Configuration, LoCoCo 2011, Perugia, Italy, 12th September 2011. EPTCS 65, 2011 [contents] -
On the Main Parameters of Parameterized Codes. -
The Value of Feedback in Decentralized Detection. -
Private Decayed Sum Estimation under Continual Observation. -
Distributed MAC Protocol Supporting Physical-Layer Network Coding. -
A unified formulation of Gaussian vs. sparse stochastic processes - Part I: Continuous-domain theory. -
A unified formulation of Gaussian vs. sparse stochastic processes - Part II: Discrete-domain theory. -
Adaptive Locomotion of Multibody Snake-like Robot. -
Weighted Reed-Muller codes revisited. -
Analysis of Recent Checkpointing Techniques for Mobile Computing Systems. -
Two-Level Fingerprinting Codes: Non-Trivial Constructions. -
Decision Support for e-Governance: A Text Mining Approach. -
Coprocessor - a Standalone SAT Preprocessor. -
Transfer from Multiple MDPs. -
Towards Configuration of applied Web-based information system. -
Efficient data compression from statistical physics of codes over finite fields. -
Blending margins. -
Integrated Solution Scheme for Handover Latency Diminution in Proxy Mobile IPv6. -
Structural Routability of n-Pairs Information Networks. -
The complexity of admissible rules of Lukasiewicz logic. -
Every Formula-Based Logic Program Has a Least Infinite-Valued Model. -
Compression and Quantitative Analysis of Buffer Map Message in P2P Streaming System. -
Buffer Map Message Compression Based on Relevant Window in P2P Streaming Media System. -
Biometric Authorization System using Gait Biometry. -
InfTucker: t-Process based Infinite Tensor Decomposition. -
Dynamic MDS Matrices for Substantial Cryptographic Strength. -
Anisotropic k-Nearest Neighbor Search Using Covariance Quadtree. -
Computation Alignment: Capacity Approximation without Noise Accumulation. -
Foundations of Traversal Based Query Execution over Linked Data (Extended Version). -
Predicting Variants of Alternative Splicing from NGS data without the Genome. -
On the Complexity of Planar Covering of Small Graphs. -
Delay Optimal Multichannel Opportunistic Access. -
Stability Criteria via Common Non-strict Lyapunov Matrix for Discrete-time Linear Switched Systems. -
Fast computation of Bernoulli, Tangent and Secant numbers. -
The Euler-Maruyama approximation for the absorbtion times. -
Digital Shearlet Transform. -
QMA variants with polynomially many provers. -
Snowflake-type network to minimize synchronization cost. -
Basketball scoring in NBA games: an example of complexity. -
Accurate Estimators for Improving Minwise Hashing and b-Bit Minwise Hashing. -
Convex Optimization without Projection Steps. -
-
Neutral evolution: A null model for language dynamics. -
Tracing the Evolution of Physics on the Backbone of Citation Networks. -
Clustering in large networks does not promote upstream reciprocity. -
Quasi-Polish Spaces. -
How Hidden are Hidden Processes? A Primer on Crypticity and Entropy Convergence. -
Some Software Packages for Partial SVD Computation. -
Evolving network models under a dynamic growth rule. -
Emergent bipartiteness in a society of knights and knaves. -
A nonlinear preconditioner for experimental design problems. -
Quantum cryptography. -
Activized Learning: Transforming Passive to Active with Improved Label Complexity. -
Temporal Networks. -
Random greedy triangle-packing beyond the 7/4 barrier. -
Onion structure and network robustness. -
Avalanche transmission and critical behavior in load bearing hierarchical networks. -
Noise effects in the quantum search algorithm from the computational complexity point of view. -
Improved Soundness for QMA with Multiple Provers. -
Lattice Green's Functions of the Higher-Dimensional Face-Centered Cubic Lattices. -
Brouwer's fixed point theorem with sequentially at most one fixed point. -
Dimension reduction for finite trees in L_1. -
Heisenberg uncertainty relation and statistical measures in the square well. -
Adversary lower bounds in the Hamiltonian oracle model. -
Search on the Brink of Chaos. -
Radio Astronomy Data Transfer and eVLBI using KAREN. -
The transversality conditions in infinite horizon problems and the stability of adjoint variable. -
Malthusian assumptions lead to Boserupian phenology in a global model of the transitions to agriculture. -
Ranking and clustering countries and their products; a network analysis. -
Correlations in sequences of generalized eigenproblems arising in Density Functional Theory. -
Fixed-Parameter and Approximation Algorithms for Maximum Agreement Forests. -
Approximate common divisors via lattices. -
Market Mechanisms with Non-Price-Taking Agents. -
Locally identifying colourings for graphs with given maximum degree. -
On the Minimum Attention and the Anytime Attention Control Problems for Linear Systems: A Linear Programming Approach. -
Partition Decomposition for Roll Call Data. -
Generalised elastic nets. -
Transmission of packets on a hierarchical network: Statistics and explosive percolation. -
Thermodynamic Semirings. -
Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes. -
Homological Error Correcting Codes and Systolic Geometry. -
Additive habits with power utility: Estimates, asymptotics and equilibrium. -
Model Reduction for Nonlinear Control Systems using Kernel Subspace Methods. -
A theory of multiclass boosting. -
Optimal control of a dengue epidemic model with vaccination. -
Generalised Mersenne Numbers Revisited. -
Min-type Morse theory for configuration spaces of hard spheres. -
Localizations on Complex Networks. -
Differential games of partial information forward-backward doubly stochastic differential equations and applications. -
A review and comparison of strategies for multi-step ahead time series forecasting based on the NN5 forecasting competition. -
A Variant of Gerdt's Algorithm for Computing Involutive Bases. -
An Application of Ramsey's Theorem to Proving Programs Terminate (An Exposition). -
On the convergence acceleration of some continued fractions. -
Overlapping Mixtures of Gaussian Processes for the Data Association Problem. -
Natural growth model of weighted complex networks. -
On deep holes of standard Reed-Solomon codes. -
Fat Triangulations and Differential Geometry. -
The bottleneck 2-connected $k$-Steiner network problem for $k\leq 2$. -
Influence, originality and similarity in directed acyclic graphs. -
High Density and Non-volatile CRS-based CAM. -
Additive combinatorics: with a view towards computer science and cryptography - An exposition. -
Edge covering pseudo-outerplanar graphs with forests. -
Totally distributive categories and injective toposes. -
Collaborative Network Formation in Spatial Oligopolies. -
Calculating the Price of Anarchy for Network Formation Games. -
Memristor-based Synaptic Networks and Logical Operations Using In-Situ Computing. -
Chains of Kinematic Points. -
Coordination of passive systems under quantized measurements. -
Limitation of multi-resolution methods in community detection. -
On sub-determinants and the diameter of polyhedra. -
On QMA Protocols with Two Short Quantum Proofs. -
On conditions for asymptotic stability of dissipative infinite-dimensional systems with intermittent damping. -
Determinantal Representations and the Hermite Matrix. -
Promoting scientific thinking with robots. -
Twin Towers of Hanoi. -
Predictor-Based Output Feedback for Nonlinear Delay Systems. -
Social dynamics with peer support on heterogeneous networks: The "mafia model". -
A note on efficient computation of hybridization number via softwired clusters. -
A Well-Behaved Alternative to the Modularity Index. -
Self-organized network design by link survivals and shortcuts. -
Searching for Nodes in Random Graphs. -
Using Supervised Learning to Improve Monte Carlo Integral Estimation. -
Quantum rate distortion, reverse Shannon theorems, and source-channel separation. -
Constructing dense graphs with sublinear Hadwiger number. -
Slime mould solves maze in one pass ... assisted by gradient of chemo-attractants. -
Total coloring of pseudo-outerplanar graphs. -
Prescribing the motion of a set of particles in a 3D perfect fluid. -
On the system F as a glue language for natural-language compositional-semantics. -
Digital Self Triggered Robust Control of Nonlinear Systems. -
Function Based Nonlinear Least Squares and Application to Jelinski--Moranda Software Reliability Model. -
Positivity of the English language. -
An Experimental Comparison of PMSPrune and Other Algorithms for Motif Search. -
A stochastic model for distributed real time streaming - Evolution of the network structure. -
Link Failure Detection in Multi-hop Control Networks. -
A tale of many cities: universal patterns in human urban mobility. -
Analysis of an M/M/1 Queue Using Fixed Order of Search for Arrivals and Service. -
Noise Covariance Properties in Dual-Tree Wavelet Decompositions. -
Prediction of peptide bonding affinity: kernel methods for nonlinear modeling. -
Providing information can be a stable non-cooperative evolutionary strategy. -
Deterministic multidimensional growth model for small-world networks. -
Robustness of a Tree-like Network of Interdependent Networks. -
A sentiment analysis of Singapore Presidential Election 2011 using Twitter data with census correction. -
A Remark on the Lasso and the Dantzig Selector. -
Substitutive Arnoux-Rauzy sequences have pure discrete spectrum. -
Unsteady Hydromagnetic Flow of Viscoelastic Fluid down an Open Inclined Channel. -
On the shoulders of students? The contribution of PhD students to the advancement of knowledge. -
Partial wave analysis at BES III harnessing the power of GPUs. -
Computational topology for configuration spaces of hard disks. -
Phase Transition in Distance-Based Phylogeny Reconstruction. -
Off-grid Direction of Arrival Estimation Using Sparse Bayesian Inference. -
The Sznajd model with limited persuasion: competition between high-reputation and hesitant agents. -
The Rabin cryptosystem revisited. -
The number of Huffman codes, compact trees, and sums of unit fractions. -
A New Computationally Efficient Measure of Topological Redundancy of Biological and Social Networks. -
Pheromone Static Routing Strategy for Complex Networks. -
Use of a speed equation for numerical simulation of hydraulic fractures. -
Stochastic optimization by message passing. -
Likelihood Consensus and Its Application to Distributed Particle Filtering. -
The ubiquity of conservative translations. -
Superposition Attacks on Cryptographic Protocols. -
A well-balanced finite volume scheme for 1D hemodynamic simulations. -
Identifiability and inference of non-parametric rates-across-sites models on large-scale phylogenies. -
Phylogenetic mixtures: Concentration of measure in the large-tree limit. -
Status of the UC-Berkeley SETI Efforts.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.