Stop the war!
Остановите войну!
for scientists:
default search action
CoRR, February 2007
-
Measuring Cognitive Activities in Software Engineering. -
The Effect of Object-Oriented Programming Expertise in Several Dimensions of Comprehension Strategies. -
Expert Programming Knowledge: a Schema-Based Approach. -
What model(s) for program understanding? -
An empirical study of software reuse by experts in object-oriented design. -
Negotiation in collaborative assessment of design solutions: an empirical study on a Concurrent Engineering process. -
Power Optimal Scheduling for Guaranteed Throughput in Multi-access Fading Channels. -
MMSE Optimal Algebraic Space-Time Codes. -
On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback. -
A canonical form for some piecewise defined functions. -
Dealing With Logical Omniscience: Expressiveness and Pragmatics. -
Plagiarism Detection in arXiv. -
Polynomial time algorithms to approximate mixed volumes within a simply exponential factor. -
Probabilistic Analysis of Linear Programming Decoding. -
Network Coding for Distributed Storage Systems. -
A multivariate interlace polynomial. -
Comment on Improved Analysis of List Decoding and Its Application to Convolutional Codes and Turbo Codes. -
Estimation of the Rate-Distortion Function. -
A Dynamic I/O Model for TRACON Traffic Management. -
Construction of Minimal Tail-Biting Trellises for Codes over Finite Abelian Groups. -
Probability Bracket Notation, Probability Vectors, Markov Chains and Stochastic Processes. -
Gnutella: Topology Dynamics On Phase Space. -
High-rate, Multi-Symbol-Decodable STBCs from Clifford Algebras. -
Searching for low weight pseudo-codewords. -
Algebraic Signal Processing Theory: Cooley-Tukey Type Algorithms for DCTs and DSTs. -
Shape preservation behavior of spline curves. -
The Suspension Calculus and its Relationship to Other Explicit Treatments of Substitution in Lambda Calculi. -
Uniform and Partially Uniform Redistribution Rules. -
On the variance of subset sum estimation. -
Optimizing the SINR operating point of spatial networks. -
Quantized vs. Analog Feedback for the MIMO Downlink: A Comparison between Zero-Forcing Based Achievable Rates. -
Finding large and small dense subgraphs. -
Bounds on ordered codes and orthogonal arrays. -
Graph Splicing System. -
New Models for the Correlation in Sensor Data. -
Efficient First-Order Temporal Logic for Infinite-State Systems. -
Evolutionary Approaches to Minimizing Network Coding Resources. -
Genetic Representations for Evolutionary Minimization of Network Coding Resources. -
Hadwiger and Helly-type theorems for disjoint unit spheres. -
Polygraphs for termination of left-linear term rewriting systems. -
The Fibers and Range of Reduction Graphs in Ciliates. -
A Formal Model for Programming Wireless Sensor Networks. -
Deciding k-colourability of P_5-free graphs in polynomial time. -
Capacity Scaling of Ad Hoc Networks with Spatial Diversity. -
Gaussian Interference Channel Capacity to Within One Bit. -
The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem. -
Hierarchical Unambiguity. -
Finding Community Structure in Mega-scale Social Networks. -
Parameterized Algorithms for Directed Maximum Leaf Problems. -
Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes. -
The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming. -
On Random Network Coding for Multicast. -
The DFAs of Finitely Different Languages. -
Nash equilibria in Voronoi games on graphs. -
On the possibility of making the complete computer model of a human brain. -
A probabilistic analysis of a leader election algorithm. -
An Efficient Algorithm to Recognize Locally Equivalent Graphs in Non-Binary Case. -
Exploring k-Colorability. -
Bounds on Generalized Huffman Codes. -
A local balance property of episturmian words. -
Sudo-Lyndon. -
Noise Limited Computational Speed. -
Entropy vectors and network codes. -
Group characterizable entropy functions. -
Towards a New ODE Solver Based on Cartan's Equivalence Method. -
Comments on "Design and performance evaluation of load distribution strategies for multiple loads on heterogeneous linear daisy chain networks". -
The Haar Wavelet Transform of a Dendrogram: Additional Notes. -
Distributed Decision Through Self-Synchronizing Sensor Networks in the Presence of Propagation Delays and Nonreciprocal Channels. -
Feasible reactivity in a synchronous pi-calculus. -
A Practical Approach to Lossy Joint Source-Channel Coding. -
What is needed to exploit knowledge of primary transmissions? -
Logic Programming with Satisfiability. -
Tradeoff between decoding complexity and rate for codes on graphs. -
Dynamic Random Geometric Graphs. -
Firebird Database Backup by Serialized Database Table Dump. -
A First Step Towards Automatically Building Network Representations. -
Properties of Rank Metric Codes. -
A Local Algorithm for Finding Dense Subgraphs. -
The Hadwiger Number of Jordan Regions is Unbounded. -
Sparse geometric graphs with small dilation. -
Random Sentences from a Generalized Phrase-Structure Grammar Interpreter. -
Invariant template matching in systems with spatiotemporal coding: a vote for instability. -
Improving Prolog programs: Refactoring for Prolog. -
Performance of Ultra-Wideband Impulse Radio in Presence of Impulsive Interference. -
Social Behaviours Applied to P2P Systems: An efficient Algorithm for Resource Organisation. -
Protection of DVB Systems by Trusted Computing. -
An Upper Bound on the Average Size of Silhouettes. -
Paths Beyond Local Search: A Nearly Tight Bound for Randomized Fixed-Point Computation. -
Mapping the Object-Role Modeling language ORM2 into Description Logic language DLRifd. -
Aperture-Angle and Hausdorff-Approximation of Convex Figures. -
Observable Graphs. -
A Note on the Periodicity and the Output Rate of Bit Search Type Generators. -
Secure Broadcasting. -
Authentication via wireless networks. -
A note on using finite non-abelian p-groups in the MOR cryptosystem. -
Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block Structure. -
Avoiding bias in cards cryptography. -
A Sum-Product Model as a Physical Basis for Shadow Fading. -
Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions. -
A Class of Multi-Channel Cosine Modulated IIR Filter Banks. -
An identity of Chernoff bounds with an interpretation in statistical physics and applications in information theory. -
Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm. -
Exploring the academic invisible web. -
A Union Bound Approximation for Rapid Performance Evaluation of Punctured Turbo Codes. -
The Simplest Solution to an Underdetermined System of Linear Equations. -
Wild, Wild Wikis: A way forward. -
AMIEDoT: An annotation model for document tracking and recommendation service. -
Orthogonal Codes for Robust Low-Cost Communication. -
AMIE: An annotation model for information research. -
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency. -
Informed Dynamic Scheduling for Belief-Propagation Decoding of LDPC Codes. -
The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming. -
How to Use Random Circulations to Find Small Cuts. -
Nearest Neighbor Network Traversal. -
Guessing based on length functions. -
The Bedwyr system for model checking over syntactic expressions. -
On a family of strong geometric spanners that admit local routing strategies. -
Interpolation-based Decoding of Alternant Codes. -
-
On the decidability and complexity of Metric Temporal Logic over finite words. -
Induced Hilbert Space, Markov Chain, Diffusion Map and Fock Space in Thermophysics. -
Transmitter and Precoding Order Optimization for Nonlinear Downlink Beamforming. -
Tree automata and separable sets of input variables. -
A Sequential Algorithm for Generating Random Graphs. -
Bayesian Network Tomography and Inference. -
Efficient Searching and Retrieval of Documents in PROSA. -
Exploiting social networks dynamics for P2P resource organisation. -
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity. -
Tree Automata and Essential Input Variables. -
Syndrome Decoding of Reed-Solomon Codes Beyond Half the Minimum Distance based on Shift-Register Synthesis. -
AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics in Arbitrary Geometries. -
Uplink Capacity and Interference Avoidance for Two-Tier Femtocell Networks. -
Fast Exact Method for Solving the Travelling Salesman Problem. -
-
High Performance Direct Gravitational N-body Simulations on Graphics Processing Units. -
Essential Inputs and Minimal Tree Automata. -
Tree Automata and Essential Subtrees. -
On the Maximal Diversity Order of Spatial Multiplexing with Transmit Antenna Selection. -
Characterization of m-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation. -
Assessing the Value of Coooperation in Wikipedia. -
Recruitment, Preparation, Retention: A case study of computing culture at the University of Illinois at Urbana-Champaign. -
An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation. -
Attribute Value Reordering For Efficient Hybrid OLAP. -
Slope One Predictors for Online Rating-Based Collaborative Filtering. -
Designing a Resource Broker for Heterogeneous Grids. -
A Local Tree Structure is NOT Sufficient for the Local Optimality of Message-Passing Decoding in Low Density Parity Check Codes. -
On the Complexity of Exact Maximum-Likelihood Decoding for Asymptotically Good Low Density Parity Check Codes. -
Linking Microscopic and Macroscopic Models for Evolution: Markov Chain Network Training and Conservation Law Approximations. -
Coupling Control and Human-Centered Automation in Mathematical Models of Complex Systems. -
A note on rate-distortion functions for nonstationary Gaussian autoregressive processes. -
Succinct Sampling on Streams. -
A Simplified Suspension Calculus and its Relationship to Other Explicit Substitution Calculi. -
Games on the Sperner Triangle. -
On the Capacity of the Single Source Multiple Relay Single Destination Mesh Network. -
On a characterization of cellular automata in tilings of the hyperbolic plane. -
On the Discovery of Random Trees. -
In Search of Simplicity: A Self-Organizing Multi-Source Multicast Overlay. -
Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors. -
Perfect Hashing for Data Management Applications. -
A Quantifier-Free String Theory for ALOGTIME Reasoning. -
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions. -
Distributed Power Allocation with Rate Constraints in Gaussian Frequency-Selective Interference Channels. -
First Passage Time for Multivariate Jump-diffusion Stochastic Models With Applications in Finance. -
Monte-Carlo Simulations of the First Passage Time for Multivariate Jump-Diffusion Processes in Financial Applications. -
Efficient estimation of default correlation for multivariate jump-diffusion processes. -
Solving Stochastic Differential Equations with Jump-Diffusion Efficiently: Applications to FPT Problems in Credit Risk. -
Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape Memory Alloys. -
Simulation of Phase Combinations in Shape Memory Alloys Patches by Hybrid Optimization Methods. -
Bistable Biorders: A Sequential Domain Theory. -
Generic Global Constraints based on MDDs. -
How Overlap Determines the Macronuclear Genes in Ciliates. -
Numerical Model For Vibration Damping Resulting From the First Order Phase Transformations. -
A Hike in the Phases of the 1-in-3 Satisfiability. -
A Landscape Analysis of Constraint Satisfaction Problems. -
Finding long cycles in graphs. -
The Multithreaded version of FORM. -
Longest Common Separable Pattern between Permutations. -
Pebble Game Algorithms and Sparse Graphs. -
Polyhedral representation conversion up to symmetries. -
Information-theoretic limits on sparsity recovery in the high-dimensional and noisy setting. -
An Example of Pi^0_3-complete Infinitary Rational Relation. -
Matrix norms and rapid mixing for spin systems. -
Consumer Profile Identification and Allocation. -
Bistability: a common feature in some "aggregates" of logistic maps. -
Size reduction of complex networks preserving modularity. -
Markovian Entanglement Networks. -
The Loss Rank Principle for Model Selection. -
Neighbor Selection and Hitting Probability in Small-World Graphs. -
A Direct Matrix Method for Computing Analytical Jacobians of Discretized Nonlinear Integro-differential Equations. -
A decoupling approach to the quantum capacity.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.