default search action
CoRR, June 2012
- Casey Bennett:
Clinical Productivity System - A Decision Support Model. - Giuseppe Carlo Calafiore, Lorenzo Fagiano:
Robust Model Predictive Control via Scenario Optimization. - Megan Belzner, Sean Colin-Ellerin, Jorge H. Román:
Language Acquisition in Computers. - Ido Tal, Alexander Vardy:
List Decoding of Polar Codes. - Chengjie Qin, Florin Rusu:
PF-OLA: A High-Performance Framework for Parallel On-Line Aggregation. - Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata:
A mathematical problem for security analysis of hash functions and pseudorandom generators. - Chuanyou Li, Michel Hurfin, Yun Wang:
Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks. - Andrea Munari, Marco Levorato, Michele Zorzi:
Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part I: Reactive Schemes. - Dian Pratiwi:
The Use of Self Organizing Map Method and Feature Selection in Image Database Classification System. - Andrea Munari, Marco Levorato, Michele Zorzi:
Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part II: Proactive Schemes. - Björn Andres, Thorsten Beier, Jörg H. Kappes:
OpenGM: A C++ Library for Discrete Graphical Models. - Emmanuel Agullo, Bérenger Bramas, Olivier Coulaud, Eric Darve, Matthias Messner, Toru Takahashi:
Pipelining the Fast Multipole Method over a Runtime System. - Jean-Eudes Méhus, Thaís Vasconcelos Batista, Jérémy Buisson:
ACME vs PDDL: support for dynamic reconfiguration of software architectures. - Krzysztof R. Apt, Sunil Simon:
A Classification of Weakly Acyclic Games. - Abdelaali Chaoub, Elhassane Ibn-Elhaj:
Comparison between Poissonian and Markovian Primary Traffics in Cognitive Radio Networks. - Christian Urban, Cezary Kaliszyk:
General Bindings and Alpha-Equivalence in Nominal Isabelle. - Josef Urban:
Parallelizing Mizar. - Hicham Elasri, Neknane Mehdi, Aatab Jamila, Ganoun Karima:
Open source based cadastral information system : ANCFCC-MOROCCO. - Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn:
Beeping a Maximal Independent Set. - Mohsen Ghaffari, Bernhard Haeupler, Nancy A. Lynch, Calvin C. Newport:
Bounds on Contention Management in Radio Networks. - Pradeep Singla, Kamya Dhingra, Naveen Kr. Malik:
DSTN (Distributed Sleep Transistor Network) for Low Power Programmable Logic array Design. - Vladimir P. Gerdt, Amir Hashemi:
Comprehensive Involutive Systems. - Ali Jarrahi, Mohammad Reza Kangavari:
An Architecture for Context-Aware Knowledge Flow Management Systems. - Or Ordentlich, Uri Erez, Bobak Nazer:
The Approximate Sum Capacity of the Symmetric Gaussian K-User Interference Channel. - Andreas Krebs, Nutan Limaye, Srikanth Srinivasan:
Streaming algorithms for recognizing nearly well-parenthesized expressions. - Mohamed A. El-Zawawy:
Efficient techniques for mining spatial databases. - Liyun Dai, Bican Xia:
Non-Termination Sets of Simple Linear Loops. - Arne Leitert:
3-Colourability of Dually Chordal Graphs in Linear Time. - M. Zahid Hossain, M. Ashraful Amin, Hong Yan:
Rapid Feature Extraction for Optical Character Recognition. - Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard:
Detection Performance in Balanced Binary Relay Trees with Node and Link Failures. - Stevan Harnad:
The Causal Topography of Cognition. - Hema Kumari Achanta, Soura Dasgupta, Weiyu Xu:
Sensing with Optimal Matrices. - J. K. Mandal, Somnath Mukhopadhyay:
Image Filtering using All Neighbor Directional Weighted Pixels: Optimization using Particle Swarm Optimization. - Joey Chakraborty:
Examining Motivations behind Paper Usage in Academia. - Prosenjit Bose, Sander Verdonschot:
A History of Flips in Combinatorial Triangulations. - Ghassan Samara:
Efficient Certificate Management in VANET. - Neda Nasiriani, Yaser P. Fallah, Hariharan Krishnan:
Fairness and Stability Analysis of Congestion Control Schemes in Vehicular Ad-hoc Networks. - Jianhui Chen, Jieping Ye:
Sparse Trace Norm Regularization. - Nima Hatami, Camelia Chira, Giuliano Armano:
A Route Confidence Evaluation Method for Reliable Hierarchical Text Categorization. - Joseph Salmon, Zachary T. Harmany, Charles-Alban Deledalle, Rebecca Willett:
Poisson noise reduction with non-local PCA. - Neil Ghani, Patricia Johann, Clément Fumex:
Generic Fibrational Induction. - T. R. Gopalakrishnan Nair, V. Suma:
Defect Management Using Depth of Inspection and the Inspection Performance Metric. - Ranjita Kumari Swain, Prafulla Kumar Behera, Durga Prasad Mohapatra:
Generation and Optimization of Test cases for Object-Oriented Software Using State Chart Diagram. - Hector Zenil, James A. R. Marshall:
Some Computational Aspects of Essential Properties of Evolution and Life. - Hector Zenil:
Introducing the Computable Universe. - Balázs Pintér, Gyula Vörös, Zoltán Szabó, András Lörincz:
Automated Word Puzzle Generation via Topic Dictionaries. - Md. Nawab Yousuf Ali, Shamim Ripon, Shaikh Muhammad Allayear:
UNL Based Bangla Natural Text Conversion - Predicate Preserving Parser Approach. - Elsayed M. Saad, Medhat H. Awadalla, Mohamed Shalan, Abdullah Elewi:
Energy-Aware Task Partitioning on Heterogeneous Multiprocessor Platforms. - Ferkan Yilmaz, Hina Tabassum, Mohamed-Slim Alouini:
On the Computation of the Higher-Order Statistics of the Channel Capacity for Amplify-and-Forward Multihop Transmission. - Richard A. Formato:
Dynamic Threshold Optimization - A New Approach? - Hari Balakrishnan, Peter Iannucci, Jonathan Perry, Devavrat Shah:
De-randomizing Shannon: The Design and Analysis of a Capacity-Achieving Rateless Code. - T. R. Gopalakrishnan Nair, P. Jayarekha:
Pre-allocation Strategies of Computational Resources in Cloud Computing using Adaptive Resonance Theory-2. - Mary Cherian, T. R. Gopalakrishnan Nair:
Multipath Routing With Novel Packet Scheduling Approach In Wireless Sensor Networks. - T. R. Gopalakrishnan Nair, Kumarashvari Subramaniam:
Transformation of Traditional Marketing Communications in to Paradigms of Social Media Networking. - Richard Southwell, Jianwei Huang, Biying Shou:
Congestion Games on Weighted Directed Graphs, with Applications to Spectrum Sharing. - K. Ganesh, M. Thrivikraman, Joy Kuri, Haresh Dagale, G. Sudhakar, Sugata Sanyal:
Implementation of a Real Time Passenger Information System. - Raju Balakrishnan, Rushi P. Bhatt:
Real-Time Bid Optimization for Group-Buying Ads. - Ioannis Kontoyiannis, Mokshay M. Madiman:
Sumset and Inverse Sumset Inequalities for Differential Entropy and Mutual Information. - Taylor Gordon:
Simultaneous Embeddings with Vertices Mapping to Pre-Specified Points. - Achim Hekler, Jörg Fischer, Uwe D. Hanebeck:
Sequence-Based Control for Networked Control Systems Based on Virtual Control Inputs. - Matteo Bianchi, Paolo Salaris, Antonio Bicchi:
Synergy-based Hand Pose Sensing: Reconstruction Enhancement. - Matteo Bianchi, Paolo Salaris, Antonio Bicchi:
Synergy-Based Hand Pose Sensing: Optimal Glove Design. - Nora Yahia, Sahar A. Mokhtar, Ahmed AbdelWahab:
Automatic Generation of OWL Ontology from XML Data Source. - Sergey Podolsky, Yuri Zorin:
O(1) Delta Component Computation Technique for the Quadratic Assignment Problem. - Edo Liberty:
Simple and Deterministic Matrix Sketching. - Nils Jansen, Erika Ábrahám, Maik Scheffler, Matthias Volk, Andreas Vorpahl, Ralf Wimmer, Joost-Pieter Katoen, Bernd Becker:
The COMICS Tool - Computing Minimal Counterexamples for Discrete-time Markov Chains. - John Paul Adrian Glaubitz:
Modern consumerism and the waste problem. - Ayad Ghany Ismaeel:
New Technique for Proposing Network's Topology using GPS and GIS. - Michele Coscia, Giulio Rossetti, Fosca Giannotti, Dino Pedreschi:
DEMON: a Local-First Discovery Method for Overlapping Communities. - Amani Tahat, Ali Khwaldeh, Mohammad Tahat:
WM Program manual. - Suzhi Bi, Ying Jun Zhang:
The Cost of Mitigating Power Law Delay in Random Access Networks. - Kostas Stamatiou, Davide Chiarotto, Federico Librino, Michele Zorzi:
Performance analysis of an opportunistic relay selection protocol for multi-hop networks. - Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard:
Rate of Learning in Hierarchical Social Networks. - Yipeng Liu, Ivan Gligorijevic, Vladimir Matic, Maarten De Vos, Sabine Van Huffel:
Multi-Sparse Signal Recovery for Compressive Sensing. - Ganesh Chandra Deka, Jasni Mohamad Zain, Prabhat Mahanti:
ICT's role in e-Governance in India and Malaysia: A Review. - Alexander Y. Davydov:
Signal and Image Processing with Sinlets. - K. B. Nakshatrala, Harsha Nagarajan:
A numerical methodology for enforcing maximum principles and the non-negative constraint for transient diffusion equations. - K. H. Miah, Roberto Henry Herrera, Mirko van der Baan, Mauricio D. Sacchi:
Application of Fractional Fourier Transform in Cepstrum Analysis. - Youhei Akimoto, Yuichi Nagata, Isao Ono, Shigenobu Kobayashi:
Theoretical foundation for CMA-ES from information geometric perspective. - Noureddine Adjir, Pierre de Saqui-Sannes, Mustapha Kamel Rahmouni, Abdelkader Adla:
Timed Test Case Generation Using Labeled Prioritized Time Petri Nets. - József Balogh, Hernán González-Aguilar, Gelasio Salazar:
Large convex holes in random point sets. - Primoz Skraba, Bei Wang:
Sampling for Local Homology with Vietoris-Rips Complexes. - Hashem Moradmand Ziyabar, Mahnaz Sinaie, Ali Payandeh, Vahid Tabataba Vakili:
Secure FSM- based arithmetic codes. - Pouyan Rafiei Fard, Keyvan Yahya:
A Mixed Observability Markov Decision Process Model for Musical Pitch. - Sari Haj Hussein:
Refining a Quantitative Information Flow Metric. - Ayad Ghany Ismaeel, Suha Adham Abdul-Rahman:
New Method of Measuring TCP Performance of IP Network using Bio-computing. - Radhouane Boughammoura, Mohamed Nazih Omri, Habib Youssef:
A Fuzzy Approach for Pertinent Information Extraction from Web Resources. - Bo Xing, Wen-jing Gao, Fulufhelo V. Nelwamondo, Kimberly Battle, Tshilidzi Marwala:
Soft Computing in Product Recovery: A Survey Focusing on Remanufacturing System. - Luca Ferrucci, Dino Mandrioli, Angelo Morzenti, Matteo Rossi:
Non-null Infinitesimal Micro-steps: a Metric Temporal Logic Approach. - Abdelkader Heni, Mohamed Nazih Omri, Adel M. Alimi:
Fuzzy Knowledge Representation Based on Possibilistic and Necessary Bayesian Networks. - Mohamed Nazih Omri:
Possibilistic Pertinence Feedback and Semantic Networks for Goal's Extraction. - Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, Chin-Liang Wang:
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks. - Nicolas Bitouze, Alexandre Graell i Amat, Eirik Rosnes:
Making WOM Codes Decodable Using Short Synchronous WOM Codes. - Kamel Garrouch, Mohamed Nazih Omri, Bachir Elayeb:
Pertinent Information retrieval based on Possibilistic Bayesian network : origin and possibilistic perspective. - Ilya Loshchilov, Marc Schoenauer, Michèle Sebag:
Black-box optimization benchmarking of IPOP-saACM-ES on the BBOB-2012 noisy testbed. - Amen Ajroud, Mohamed Nazih Omri, Habib Youssef, Salem Benferhat:
Loopy Belief Propagation in Bayesian Networks : origin and possibilistic perspectives. - Pradeep B. H., Sanjay Singh:
Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices using Secure Three Way Authentication. - Anna Cinzia Squicciarini, Christopher Griffin:
An Informed Model of Personal Information Release in Social Networking Sites. - Paul M. B. Vitányi:
Conditional Kolmogorov Complexity and Universal Probability. - Anindya De, Ilias Diakonikolas, Vitaly Feldman, Rocco A. Servedio:
Nearly optimal solutions for the Chow Parameters Problem and low-weight approximation of halfspaces. - Mueen Uddin, Azizah Abdul Rahman:
Virtualization Implementation Model for Cost Effective & Efficient Data Centers. - Guodong Shi, Mikael Johansson, Karl Henrik Johansson:
When Do Gossip Algorithms Converge in Finite Time? - Ayan Acharya, Eduardo R. Hruschka, Joydeep Ghosh, Sreangsu Acharyya:
An Optimization Framework for Semi-Supervised and Transfer Learning using Multiple Classifiers and Clusterers. - Laurent Doyen, Thierry Massart, Mahsa Shirmohammadi:
Infinite Synchronizing Words for Probabilistic Automata (Erratum). - Zhanghua Fu, Wenqi Huang, Zhipeng Lü:
Iterated tabu search for the circular open dimension problem. - Mohammed Elarnaoty, Samir E. AbdelRahman, Aly A. Fahmy:
A Machine Learning Approach For Opinion Holder Extraction In Arabic Language. - Iztok Fister Jr., Iztok Fister, Janez Brest:
A Hybrid Artificial Bee Colony Algorithm for Graph 3-Coloring. - Manel Zarrouk, Med Salah Gouider:
Frequent Patterns mining in time-sensitive Data Stream. - Mohamed Nazih Omri:
Relevance Feedback for Goal's Extraction from Fuzzy Semantic Networks. - Mohamed Nazih Omri, Mohamed Ali Mahjoub:
Use of Fuzzy Sets in Semantic Nets for Providing On-Line Assistance to User of Technological Systems. - Shuqing Zeng:
An IMU-Aided Carrier-Phase Differential GPS Positioning System. - Eunsol Choi, Chenhao Tan, Lillian Lee, Cristian Danescu-Niculescu-Mizil, Jennifer Spindel:
Hedge detection as a lens on framing in the GMO debates: A position paper. - Diederik Aerts, Liane Gabora, Sandro Sozzo:
How Concepts Combine: A Quantum Theoretic Modeling of Human Thought. - Iztok Fister, Iztok Fister Jr., Janez Brest, Viljem Zumer:
Memetic Artificial Bee Colony Algorithm for Large-Scale Global Optimization. - Matan Banin, Boaz Tsaban:
The Discrete Logarithm Problem in non-representable rings. - Anselme Tueno:
Zwei Anwendungen des Paillier-Kryptosystems: Blinde Signatur und Three-Pass-Protocol. - Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
Dynamic Verification for File Safety of Multithreaded Programs. - Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman:
Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications. - Biao Xiang, Enhong Chen, Hui Xiong, Qi Liu:
A Linear Circuit Model For Social Influence. - Maleq Khan, V. S. Anil Kumar, Gopal Pandurangan, Guanhong Pei:
A Fast Distributed Approximation Algorithm for Minimum Spanning Trees in the SINR Model. - Can Sun, Chenyang Yang, Yonghui Li, Branka Vucetic:
Transceiver Design for Multi-user Multi-antenna Two-way Relay Cellular Systems. - Han Qi, Abdullah Gani:
Research On Mobile Cloud Computing: Review, Trend, And Perspectives. - George Dimitoglou, James A. Adams, Carol M. Jim:
Comparison of the C4.5 and a Naive Bayes Classifier for the Prediction of Lung Cancer Survivability. - Rachit Agarwal, Matthew Caesar, Brighten Godfrey, Ben Y. Zhao:
Shortest Paths in Less Than a Millisecond. - Frits de Nijs, Daan Wilmer:
Evaluation and Improvement of Laruelle-Widgrén Inverse Banzhaf Approximation. - Jia Zeng, Zhi-Qiang Liu, Xiao-Qin Cao:
Memory-Efficient Topic Modeling. - Charl P. Botha, Bernhard Preim, Arie E. Kaufman, Shigeo Takahashi, Anders Ynnerman:
From individual to population: Challenges in Medical Visualization. - Gleb Beliakov, Michael Johnstone, Douglas C. Creighton, Tim Wilkin:
Parallel random variates generator for GPUs based on normal numbers. - Haoyang Wu:
Traditional sufficient conditions for Nash implementation may fail on Internet. - Yanfu Li, Enrico Zio:
Uncertainty Analysis of the Adequacy Assessment Model of a Distributed Generation System. - Alexandre Adrien Chotard, Anne Auger, Nikolaus Hansen:
Cumulative Step-size Adaptation on Linear Functions. - Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Reciprocally induced coevolution: A computational metaphor in Mathematics. - Siva Theja Maguluri, R. Srikant, Lei Ying:
Heavy Traffic Optimal Resource Allocation Algorithms for Cloud Computing Clusters. - Vinod M. Prabhakaran, Manoj Prabhakaran:
Assisted Common Information with an Application to Secure Two-Party Sampling. - Othon Michail, Ioannis Chatzigiannakis, Paul G. Spirakis:
Causality, Influence, and Computation in Possibly Disconnected Dynamic Networks. - Mohammadreza Keyvanpour, Reza Tavoli:
Feature Weighting for Improving Document Image Retrieval System Performance. - John Z. Sun, Vinith Misra, Vivek K. Goyal:
Distributed Functional Scalar Quantization Simplified. - Massimiliano Vasile, Federico Zuiani:
MACS: An Agent-Based Memetic Multiobjective Optimization Algorithm Applied to Space Trajectory Design. - Federico Zuiani, Massimiliano Vasile, Alison Gibbings:
Evidence-Based Robust Design of Deflection Actions for Near Earth Objects. - Stephanie Jakus, Joseph O'Rourke:
From Pop-Up Cards to Coffee-Cup Caustics: The Knight's Visor. - Taolue Chen, Klaus Dräger, Stefan Kiefer:
Model Checking Stochastic Branching Processes. - Abdelkader Heni, Mohamed Nazih Omri, Adel M. Alimi:
Certain Bayesian Network based on Fuzzy knowledge Bases. - Seth A. Myers, Chenguang Zhu, Jure Leskovec:
Information Diffusion and External Influence in Networks. - Ghassan Samara:
Security Analysis of Vehicular Ad Hoc Networks (VANET). - Christian Mader, Bernhard Haslhofer, Antoine Isaac:
Finding Quality Issues in SKOS Vocabularies. - Xiaowen Gong, Junshan Zhang, Douglas Cochran:
A Coverage Theory of Bistatic Radar Networks: Worst-Case Intrusion Path and Optimal Deployment. - Ahmed Soua, Walid Ben-Ameur, Hossam Afifi:
Broadcast-based Directional Routing in Vehicular Ad-Hoc Networks. - Xi Liu, Osvaldo Simeone, Elza Erkip:
Lossy Computing of Correlated Sources with Fractional Sampling. - Kishore Jaganathan, Samet Oymak, Babak Hassibi:
Recovery of Sparse 1-D Signals from the Magnitudes of their Fourier Transform. - Arundhati Walia, Syed I. Ahson:
A Novel Advanced Heap Corruption and Security Method. - Hooshiar Zolfagharnasab:
Reducing Packet Overhead in Mobile IPv6. - Shahab Firouzi, Amin Nezarat:
An Intelligent Approach for Negotiating between chains in Supply Chain Management Systems. - Thuy Van T. Duong, Dinh Que Tran, Cong Hung Tran:
A weighted combination similarity measure for mobility patterns in wireless networks. - Salim El Khediri, Nejah Nasri, Mounir Samet, Anne Wei, Abdennaceur Kachouri:
Analysis study of time synchronization protocols in wireless sensor networks. - Gabriel Nivasch, János Pach, Gábor Tardos:
The visible perimeter of an arrangement of disks. - Maher Heni, Ammar Bouallegue, Ridha Bouallegue:
Energy Consumption Model in ad hoc Mobile Network. - Hanspeter Pfister, Verena Kaynig, Charl P. Botha, Stefan Bruckner, Vincent J. Dercksen, Hans-Christian Hege, Jos B. T. M. Roerdink:
Visualization in Connectomics. - Yogita Khatri:
Distance Based Asynchronous Recovery Approach in Mobile Computing Environment. - Ali Tajer, Rui M. Castro, Xiaodong Wang:
Adaptive Sensing of Congested Spectrum Bands. - Asif Perwej:
On applying Neuro - Computing in E-com Domain. - Asif Perwej:
Analytical Study for Seeking Relation Between Customer Relationship Management and Enterprise Resource Planning. - Debalina Ghosh, Depanwita Sarkar Debnath, Saikat Bose:
A comparative study of performance of fpga based mel filter bank & bark filter bank. - J. Rafael Sendra, David Sevilla:
First Steps Towards Radical Parametrization of Algebraic Surfaces. - Shervan Fekri Ershad, Sattar Hashemi:
Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches. - Liang Ma, Ruina Ma, Damien Chablat, Fouad Bennis:
Human Arm simulation for interactive constrained environment design. - Ruina Ma, Damien Chablat, Fouad Bennis:
A new approach to muscle fatigue evaluation for Push/Pull task. - Robayet Nasim:
Security Threats Analysis in Bluetooth-Enabled Mobile Devices. - Georg Singer, Ulrich Norbisrath, Dirk Lewandowski:
An Experiment with Ordinary Web Search Engine Users Carrying Out Complex Search Tasks. - Georg Singer, Ulrich Norbisrath, Dirk Lewandowski:
Impact of Gender and Age on performing Search Tasks Online. - Manal Abdullah, Majda Wazzan, Sahar Bo-saeed:
Optimizing Face Recognition Using PCA. - Manal A. Abdullah, Lulwah M. Al-Harigy, Hanadi H. Al-Fraidi:
Off-Line Arabic Handwriting Character Recognition Using Word Segmentation. - Gopal Pandurangan, Peter Robinson, Amitabh Trehan:
Self-healing Deterministic Expanders. - Anastasios Kyrillidis, Stephen Becker, Volkan Cevher:
Sparse projections onto the simplex. - J. M. Landsberg:
New lower bounds for the rank of matrix multiplication. - Jun Zhao, Osman Yagan, Virgil D. Gligor:
k-Connectivity in Secure Wireless Sensor Networks with Physical Link Constraints - The On/Off Channel Model. - G. Sumathi, R. Raju:
Software Aging Analysis of Web Server Using Neural Networks. - K. Vasanth, V. Jawahar Senthil Kumar:
Performance Analysis of Unsymmetrical trimmed median as detector on image noises and its Fpga implementation. - Andrew Lohr:
Tight Lower Bounds for Unequal Division. - Jay Gholap, Anurag Ingole, Jayesh Gohil, Shailesh Gargade, Vahida Attar:
Soil Data Analysis Using Classification Techniques and Soil Attribute Prediction. - Rourab Paul, Suman Sau, Amlan Chakrabarti:
Architecture for real time continuous sorting on large width data volume for fpga based applications. - Mohammad Reihaneh, Daniel Karapetyan:
An Efficient Hybrid Ant Colony System for the Generalized Traveling Salesman Problem. - Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks. - Ahmed Dooguy Kora, Moussa Moindze Soidridine:
Nagios Based Enhanced IT Management System. - Mohamed Nazih Omri:
Objects and Goals Extraction from Semantic Networks : Applications of Fuzzy SetS Theory. - Ahmed Dooguy Kora:
DWDM/OOC and large spectrum sources performance in broadband access network. - Mohamed Nazih Omri, Noureddine Chouigui:
Measure of Similarity between Fuzzy Concepts for Optimization of Fuzzy Semantic Nets. - Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff:
Low-complexity Optimal Scheduling over Correlated Fading Channels with ARQ Feedback. - Stefano Braghin, Jackson Tan Teck Yong, Rajesh Sharma, Anwitaman Datta:
PriSM: A Private Social Mesh for Leveraging Social Networking at Workplace. - Sarvesh Kumar Sharma:
An Approach In Optimization Of AD-Hoc Routing Algorithms. - Kahkashan Tabassum, Asia Sultana, A. Damodaram:
Flexible Data Dissemination Strategy for Effective Cache Consistency in Mobile Wireless Communication Networks. - Ankur Dumka, Hardwari Lal Mandoria:
Dynamic MPLS with Feedback. - G. Mageshwari, E. Grace Mary Kanaga:
A Distributed Optimized Patient Scheduling using Partial Information. - Silvia Crafa:
Behavioural Types for Actor Systems. - Richárd Kápolnai, Gábor Domokos, Tímea Szabó:
Generating spherical multiquadrangulations by restricted vertex splittings and the reducibility of equilibrium classes. - Carlo Comin, Maria Paola Bianchi:
Algebraic Characterization of the Class of Languages recognized by Measure Only Quantum Automata. - Max Neunhöffer, Markus Pfeiffer, Nik Ruskuc:
Deciding Word Problems of Semigroups using Finite State Automata. - T. P. Surekha, T. Ananthapadmanabha, C. Puttamadappa:
C-Band VSAT Data Communication System and RF Impairments. - Mohamed Nazih Omri:
Softening Fuzzy Knowledge Representation Tool with the Learning of New Words in Natural Language. - Derek Greene, Gavin Sheridan, Barry Smyth, Pádraig Cunningham:
Aggregating Content and Network Information to Curate Twitter User Lists. - Kinjal Shah, Satya Prakash Ghrera, Alok Thaker:
A novel approach for security issues in VoIP networks in Virtualization with IVR. - Kristoffer Arnsfelt Hansen, Rasmus Ibsen-Jensen, Vladimir V. Podolskii, Elias P. Tsigaridas:
Patience of Matrix Games. - Shuai Yuan, Ahmad Zainal Abidin, Marc Sloan, Jun Wang:
Internet Advertising: An Interplay among Advertisers, Online Publishers, Ad Exchanges and Web Users. - Holger Dell, Thore Husfeldt, Dániel Marx, Nina Taslaman, Martin Wahlen:
Exponential Time Complexity of the Permanent and the Tutte Polynomial. - Mohamed Nazih Omri:
Fuzzy Knowledge Representation, Learning and Optimization with Bayesian Analysis in Fuzzy Semantic Networks. - Sarah Cannon, Diane L. Souvaine, Andrew Winslow:
Hidden Mobile Guards in Simple Polygons. - Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan:
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks. - (Withdrawn) CyberChair: A Web-Based Groupware Application to Facilitate the Paper Reviewing Process.
- (Withdrawn) Efficient Algorithms for Finding Tucker Patterns.
- Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An Enhanced Evaluation Model For Vertical Handover Algorithm In Heterogeneous Networks. - Iztok Fister, Iztok Fister Jr.:
Concept of drafting detection system in Ironmans. - Mohamed Nazih Omri:
Optimization of Fuzzy Semantic Networks Based on Galois Lattice and Bayesian Formalism. - Yuanyi Xue, Yao Wang:
Perceptual quality comparison between single-layer and scalable videos at the same spatial, temporal and amplitude resolutions. - Riccardo Dondi, Nadia El-Mabrouk:
On the Complexity of Minimum Labeling Alignment of Two Genomes. - Bryan Bruns:
Escaping Prisoner's Dilemmas: From Discord to Harmony in the Landscape of 2x2 Games. - Donghyuk Shin, Si Si, Inderjit S. Dhillon:
Multi-Scale Link Prediction. - (Withdrawn) TTMA: Traffic-adaptive Time-division Multiple Access Protocol Wireless Sensor Networks.
- Wenyuan Tang, Rahul Jain:
Mechanism Designs for Stochastic Resources for Renewable Energy Integration. - Preetida Vinayakray-Jani, Sugata Sanyal:
Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis. - Nengkun Yu, Mingsheng Ying:
Reachability and Termination Analysis of Concurrent Quantum Programs. - Daan J. C. Staudt:
Completeness for Two Left-Sequential Logics. - Dimitrios Georgakopoulos, Rajiv Ranjan, Karan Mitra, Xiangmin Zhou:
MediaWise - Designing a Smart Media Cloud. - Mojtaba Vaezi:
The Capacity of Less Noisy Cognitive Interference Channels. - Mojtaba Nouri, Mahdi Bayat Mokhtari, Sohrab Mirsaeidi, Mohammad Reza Miveh:
Improvement of Loadability in Distribution System Using Genetic Algorithm. - Harshavardhan Kayarkar, Sugata Sanyal:
A Survey on Various Data Hiding Techniques and their Comparative Analysis. - Saurabh Sarkar:
A novel 2.5D approach for interfacing with web applications. - Iztok Fister Jr., Marjan Mernik, Iztok Fister, Dejan Hrncic:
Implementation of EasyTime Formal Semantics using a LISA Compiler Generator. - Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations. - William R. Carson, Minhua Chen, Miguel R. D. Rodrigues, A. Robert Calderbank, Lawrence Carin:
Communications-Inspired Projection Design with Application to Compressive Sensing. - Prosenjit Bose, Vida Dujmovic, Nima Hoda, Pat Morin:
Visibility-Monotonic Polygon Deflation. - Masnida Emami, Yashar Ghiasi, Nasrin Jaberi:
Energy-Aware Scheduling using Dynamic Voltage-Frequency Scaling. - Niranjan Balachandran, Srimanta Bhattacharya:
Note on an Extremal Hypergraph Problem Related to Combinatorial Batch Codes. - Doan B. Hoang, Najmeh Kamyabpour:
An Energy Driven Architecture for Wireless Sensor Networks. - Asma Boudhief, Mohsen Maraoui, Mounir Zrigui:
Developing a model for a text database indexed pedagogically for teaching the Arabic language. - Michele Filannino:
Temporal expression normalisation in natural language texts. - Nikzad Babaii Rizvandi, Javid Taheri, Albert Y. Zomaya:
Network Load Analysis and Provisioning of MapReduce Applications. - Yannai A. Gonczarowski:
Timely Coordination in a Multi-Agent System. - (Withdrawn) Logic programming without Prolog.
- Tien Tuan Anh Dinh, Quach Vinh Thanh, Anwitaman Datta:
Delegated Secure Sum Service for Distributed Data Mining in Multi-Cloud Settings. - Chi-Yao Hong, Matthew Caesar, Brighten Godfrey:
Finishing Flows Quickly with Preemptive Scheduling. - Ali Shadvar:
Dimension Reduction by Mutual Information Discriminant Analysis. - M. Emre Celebi, Hassan A. Kingravi, Fatih Celiker:
Comments on "On Approximating Euclidean Metrics by Weighted t-Cost Distances in Arbitrary Dimension". - Chamberlain Fong:
Indoor Polar Panoramas Using a Rectified Lambert Azimuthal Equal-Area Projection. - Reza Bosagh Zadeh, Ashish Goel:
Dimension Independent Similarity Computation. - Curtis Menton, Preetjot Singh:
Manipulation and Control Complexity of Schulze Voting. - Philipp Schaer, Philipp Mayr, Thomas Lüke:
Extending Term Suggestion with Author Names. - Thomas Lüke, Philipp Schaer, Philipp Mayr:
Improving Retrieval Results with discipline-specific Query Expansion. - Davide Zordan, Borja Martínez, Ignasi Vilajosana, Michele Rossi:
To Compress or Not To Compress: Processing vs Transmission Tradeoffs for Energy Constrained Sensor Networking. - Giuseppe Toscani:
An information-theoretic proof of Nash's inequality. - Lvzhou Li, Yuan Feng:
On hybrid models of quantum finite automata. - Lei Li, Tianshi Chen, Yunji Chen, Ling Li, Ruiyang Wu:
RepTFD: Replay Based Transient Fault Detection. - Deepak Kedia:
Comparative Analysis of Peak Correlation Characteristics of Non-Orthogonal Spreading Codes for Wireless Systems. - Lluis Pamies-Juarez, Frédérique E. Oggier, Anwitaman Datta:
An Empirical Study of the Repair Performance of Novel Coding Schemes for Networked Distributed Storage Systems. - Samir Genaim, Damiano Zanardini:
Reachability-based Acyclicity Analysis by Abstract Interpretation. - Jianfeng Yan, Zhi-Qiang Liu, Yang Gao, Jia Zeng:
Communication-Efficient Parallel Belief Propagation for Latent Dirichlet Allocation. - Rong Fan, Qun Wan, Yipeng Liu, Hui Chen, Xiao Zhang:
Complex Orthogonal Matching Pursuit and Its Exact Recovery Conditions. - Inder Jeet Taneja:
Representations of Genetic Tables, Bimagic Squares, Hamming Distances and Shannon Entropy. - Tammo Krueger, Danny Panknin, Mikio L. Braun:
Fast Cross-Validation via Sequential Testing. - Glencora Borradaile, David Eppstein:
Near-Linear-Time Deterministic Plane Steiner Spanners and TSP Approximation for Well-Spaced Point Sets. - Michael Kapralov:
Improved lower bounds for matchings in the streaming model. - Masoud Alipour, Omid Etesami, Ghid Maatouk, Amin Shokrollahi:
Irregular Product Codes. - Hina Tabassum, Ferkan Yilmaz, Zaher Dawy, Mohamed-Slim Alouini:
An Intercell Interference Model based on Scheduling for Future Generation Wireless Networks (Part 1 and Part 2). - Hamid Zarrazvand, Mohammad Shojafar:
The Use of Fuzzy Cognitive Maps in Analyzing and Implementation of ITIL Processes. - Manoj Rameshchandra Thakur, Sugata Sanyal:
A PAXOS based State Machine Replication System for Anomaly Detection. - Yen-Fu Ou, Yuanyi Xue, Yao Wang:
Q-STAR:A Perceptual Video Quality Model Considering Impact of Spatial, Temporal, and Amplitude Resolutions. - Rong Fan, Qun Wan, Xiao Zhang, Hui Chen, Yipeng Liu:
A Fast HRRP Synthesis Algorithm with Sensing Dictionary in GTD Model. - Eduardo López-Sandoval, Alexandre Mello:
Series Solution of Non Linear Partial Differential equations from Physical Mathematical. - Mohamed Nazih Omri:
Uncertain and Approximative Knowledge Representation to Reasoning on Classification with a Fuzzy Networks Based System. - Mikael Hirki:
Applying Compression to a Game's Network Protocol. - Katherine Edwards, Andrew D. King:
Bounding the fractional chromatic number of KΔ-free graphs. - Luke Mathieson:
A Proof Checking View of Parameterized Complexity. - Md. Sahidullah, Goutam Saha:
A Novel Windowing Technique for Efficient Computation of MFCC for Speaker Recognition. - Thiyagarajan Paramasivan, Gnanasekaran Aghila, V. Prasanna Venkatesan:
Pixastic: Steganography based Anti-Phihsing Browser Plug-in. - Dariusz Gasior, Maciej Drwal:
Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks. - Tim van Erven, Peter Harremoës:
Rényi Divergence and Kullback-Leibler Divergence. - Kristiina Singer, Georg Singer, Krista Lepik, Ulrich Norbisrath, Pille Pruulmann-Vengerfeldt:
Search Strategies of Library Search Experts. - Mikhail Ivanov, Fredrik Brannstrom, Alex Alvarado, Erik Agrell:
On the Exact BER of Bit-Wise Demodulators for One-Dimensional Constellations. - Puneet Singh, Ashutosh Kapoor, Vishal Kaushik, Hima Bindu Maringanti:
Architecture for Automated Tagging and Clustering of Song Files According to Mood. - Ramji Venkataramanan, Sekhar Tatikonda, Luis A. Lastras, Michele Franceschini:
Coding strategies for the uniform noise rewritable channel with hidden state. - Michael Lampis:
Improved Inapproximability for TSP. - R. Shyam Sundar, S. Nanda Kumar:
Performance Improvement of Heterogeneous Wireless Networks using Modified Newton Method. - David Novak, Petr Volny, Pavel Zezula:
Generic Subsequence Matching Framework: Modularity, Flexibility, Efficiency. - Xiangju Qin, Pádraig Cunningham:
Assessing the Quality of Wikipedia Pages Using Edit Longevity and Contributor Centrality. - Camille Salinesi, Raouia Triki, Raúl Mazo:
Combining configuration and recommendation to define an interactive product line configuration approach. - Golnaz Badkobeh, Gabriele Fici, Steve Kroon, Zsuzsanna Lipták:
Binary Jumbled String Matching: Faster Indexing in Less Space. - Georg Singer, Ulrich Norbisrath, Dirk Lewandowski:
Ordinary Search Engine Users assessing Difficulty, Effort, and Outcome for Simple and Complex Search Tasks. - Robert Mingesz, Laszlo B. Kish, Zoltan Gingl, Claes-Goran Granqvist, He Wen, Ferdinand Peper, T. Eubanks, Gabor Schmera:
Information theoretic security by the laws of classical physics. - Iztok Fister Jr., Marjan Mernik, Iztok Fister, Dejan Hrncic:
Implementation of the Domain-Specific Language EasyTime using a LISA Compiler Generator. - Shah Mahmood, Ismatullah Nazar:
Education in Conflict Zones: a Web and Mobility Approach. - Michael Viderman:
LP decoding of expander codes: a simpler proof. - Thiyagarajan Paramasivan, Gnanasekaran Aghila, V. Prasanna Venkatesan:
Dynamic Pattern Based Image Steganography. - Thiyagarajan Paramasivan, Gnanasekaran Aghila, V. Prasanna Venkatesan:
Stego-Image Generator (SIG) - Building Steganography Image Database. - Imtiez Fliss, Moncef Tagina:
Exploiting Particle Swarm Optimization in Multiple Faults Fuzzy Detection. - Heru Susanto, Mohammad Nabil Almunawar:
Information Security Awareness Within Business Environment: An IT Review. - (Withdrawn) An Efficient Signature Scheme based on Factoring and Discrete Logarithm.
- Zhan Ma, Hao Hu, Meng Xu, Yao Wang:
Rate Model for Compressed Video Considering Impacts Of Spatial, Temporal and Amplitude Resolutions and Its Applications for Video Coding and Adaptation. - Tanaya Guha, Rabab K. Ward:
On Image Similarity, Sparse Representation and Kolmogorov Complexity. - Alain Couvreur, Nicolas Delfosse, Gilles Zémor:
A Construction of Quantum LDPC Codes from Cayley Graphs. - Taeho Jung, Xiang-Yang Li, Zhiguo Wan:
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption. - Taeho Jung, Xiang-Yang Li, Shaojie Tang:
Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely. - Ye Wang, Prakash Ishwar, Shantanu Rane:
Information-Theoretically Secure Three-Party Computation with One Active Adversary. - Muddassar A. Sindhu, Karl Meinke:
IDS: An Incremental Learning Algorithm for Finite Automata. - Finn Årup Nielsen, Matthew J. Kempton, Steven C. R. Williams:
Online open neuroimaging mass meta-analysis. - Gabriele D'Angelo, Stefano Ferretti, Moreno Marzolla:
Time Warp on the Go (Updated Version). - Stefano Ferretti, Gabriele D'Angelo:
Mobile Online Gaming via Resource Sharing. - Luca Toscano, Gabriele D'Angelo, Moreno Marzolla:
Parallel Discrete Event Simulation with Erlang. - Silvio Jamil Ferzoli Guimarães, Jean Cousty, Yukiko Kenmochi, Laurent Najman:
An efficient hierarchical graph based image segmentation. - Jasper J. Kreeft, Marc I. Gerritsma:
A priori error estimates for compatible spectral discretization of the Stokes problem for all admissible boundary conditions. - (Withdrawn) Topological study and Lyapunov exponent of a secure steganographic scheme.
- Sebastian Benthall, John Chuang:
Computational Asymmetry in Strategic Bayesian Networks. - Dara O. Shayda:
Decomposition of Kolmogorov Complexity And Link To Geometry. - Thiyagarajan Paramasivan, Gnanasekaran Aghila, V. Prasanna Venkatesan:
Steganalysis Using Color Model Conversion. - Nathan O. Collier, Lisandro Dalcín, David Pardo, Victor M. Calo:
The cost of continuity: performance of iterative solvers on isogeometric finite elements. - Shaddin Dughmi, Yuval Peres:
Mechanisms for Risk Averse Agents, Without Loss. - Venkatesan N. Ekambaram, Kannan Ramchandran, Raja Sengupta:
Collaborative High Accuracy Localization in Mobile Multipath Environments. - Emrah Akyol, Kenneth Rose:
On Constrained Randomized Quantization. - (Withdrawn) Towards Optimality in Transform Coding.
- Céline Jost, Brigitte Le Pévédic, Dominique Duhaut:
Creating Interaction Scenarios With a New Graphical User Interface. - Céline Jost, Brigitte Le Pévédic, Dominique Duhaut:
Study of the Importance of Adequacy to Robot Verbal and Non Verbal Communication in Human-Robot interaction. - Yao Li, Péter Vingelmann, Morten Videbæk Pedersen, Emina Soljanin:
Round-Robin Streaming with Generations. - Jörg Pohle:
Social Networks, Functional Differentiation of Society, and Data Protection. - Justin P. Coon, Yue Wang, Gillian Huang:
Asymptotic Outage Probability Analysis for General Fixed-Gain Amplify-and-Forward Multihop Relay Systems. - Manish K. Gupta, C. Durairajan:
On the Covering Radius of Some Modular Codes. - Siva Alagu, T. Meyyappan:
A Novel Adaptive Channel Allocation Scheme to Handle Handoffs. - Matus Telgarsky:
Statistical Consistency of Finite-dimensional Unregularized Linear Classification. - Saurabh Pal:
Mining Educational Data Using Classification to Decrease Dropout Rate of Students. - Paolo Di Lorenzo, Ali H. Sayed:
Sparse Distributed Learning Based on Diffusion Adaptation. - Francesco Calimeri, Giovambattista Ianni, Francesco Ricca:
The third open Answer Set Programming competition. - Vijay G. Subramanian, Douglas J. Leith:
Convexity Conditions for 802.11 WLANs. - Mahdi Jafari Siavoshani, Christina Fragouli:
Multi-terminal Secrecy in a Linear Non-coherent Packetized Networks. - Cristian Prisacariu:
The Glory of the Past and Geometrical Concurrency. - Ashish Khisti, Brett Hern, Krishna R. Narayanan:
On Modulo-Sum Computation over an Erasure Multiple Access Channel. - Dohy Hong, Philippe Jacquet:
Optimizing the eigenvector computation algorithm with diffusion approach. - Alexander Pilz:
Flip Distance Between Triangulations of a Planar Point Set is NP-Complete. - Michele Barletta, Silvio Ranise, Luca Viganò:
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version). - Alessandro Cimatti, Iman Narasamdya, Marco Roveri:
Software Model Checking with Explicit Scheduler and Symbolic Threads. - Adithya Rajan, Cihan Tepedelenlioglu:
A New Representation for the Symbol Error Rate. - Pranjal Awasthi, Or Sheffet:
Improved Spectral-Norm Bounds for Clustering. - Emma Brunskill, Bethany R. Leffler, Lihong Li, Michael L. Littman, Nicholas Roy:
CORL: A Continuous-state Offset-dynamics Reinforcement Learner. - Vibhav Gogate, Rina Dechter:
AND/OR Importance Sampling. - Alejandro Isaza, Csaba Szepesvári, Vadim Bulitko, Russell Greiner:
Speeding Up Planning in Markov Decision Processes via Automatically Constructed Abstractions. - Umut A. Acar, Alexander T. Ihler, Ramgopal R. Mettu, Özgür Sümer:
Adaptive Inference on General Graphical Models. - Dimitrios Antos, Avi Pfeffer:
Identifying reasoning patterns in games. - Vincent Auvray, Louis Wehenkel:
Learning Inclusion-Optimal Chordal Graphs. - David Barber:
Clique Matrices for Statistical Graph Decomposition and Parameterising Restricted Positive Definite Matrices. - Liefeng Bo, Cristian Sminchisescu:
Greedy Block Coordinate Descent for Large Scale Gaussian Process Regression. - Venkat Chandrasekaran, Nathan Srebro, Prahladh Harsha:
Complexity of Inference in Graphical Models. - Arthur Choi, Adnan Darwiche:
Approximating the Partition Function by Deleting and then Correcting for Model Edges. - C. Mario Christoudias, Raquel Urtasun, Trevor Darrell:
Multi-View Learning in the Presence of View Disagreement. - Botond Cseke, Tom Heskes:
Bounds on the Bethe Free Energy for Gaussian Networks. - James Cussens:
Bayesian network learning by compiling to weighted MAX-SAT. - A. Philip Dawid, Vanessa Didelez:
Identifying Optimal Sequential Decisions. - Cassio Polpo de Campos, Qiang Ji:
Strategy Selection in Influence Diagrams using Imprecise Probabilities. - Justin Domke:
Learning Convex Inference of Marginals. - Quang Duong, Michael P. Wellman, Satinder Singh:
Knowledge Combination in Graphical Multiagent Model. - John C. Duchi, Stephen Gould, Daphne Koller:
Projected Subgradient Methods for Learning Sparse Gaussians. - Frederick Eberhardt:
Almost Optimal Intervention Sets for Causal Discovery. - Tal El-Hay, Nir Friedman, Raz Kupferman:
Gibbs Sampling in Factorized Continuous-Time Markov Processes. - Gal Elidan, Benjamin Packer, Geremy Heitz, Daphne Koller:
Convex Point Estimation using Undirected Bayesian Transfer Hierarchies. - Sevan G. Ficici, David C. Parkes, Avi Pfeffer:
Learning and Solving Many-Player Games through a Cluster-Based Representation. - Amit Gruber, Michal Rosen-Zvi, Yair Weiss:
Latent Topic Models for Hypertext. - Noah D. Goodman, Vikash Mansinghka, Daniel M. Roy, Kallista A. Bonawitz, Joshua B. Tenenbaum:
Church: a language for generative models. - Kuzman Ganchev, João Graça, John Blitzer, Ben Taskar:
Multi-View Learning over Structured and Non-Identical Outputs. - Varun Ganapathi, David Vickrey, John C. Duchi, Daphne Koller:
Constrained Approximate Maximum Entropy Learning of Markov Random Fields. - Bowen Hui, Craig Boutilier:
Toward Experiential Utility Elicitation for Interface Customization. - Jim C. Huang, Brendan J. Frey:
Cumulative distribution networks and the derivative-sum-product algorithm. - Greg Hines, Kate Larson:
Learning When to Take Advice: A Statistical Test for Achieving A Correlated Equilibrium. - Tamir Hazan, Amnon Shashua:
Convergent Message-Passing Algorithms for Inference over General Graphs with Convex Free Energies. - Eric A. Hansen:
Sparse Stochastic Finite-State Controllers for POMDPs. - Hannaneh Hajishirzi, Eyal Amir:
Sampling First Order Logical Particles. - Johan Kwisthout, Linda C. van der Gaag:
The Computational Complexity of Sensitivity Analysis and Parameter Tuning. - Branislav Kveton, Milos Hauskrecht:
Partitioned Linear Programming Approximations for MDPs. - Tony Jebara:
Bayesian Out-Trees. - Marina Meila, Le Bao:
Estimation and Clustering with Infinite Rankings. - Daniel Lowd, Pedro M. Domingos:
Learning Arithmetic Circuits. - Gregory Lawrence, Stuart Russell:
Improving Gradient Estimation by Incorporating Sensor Data. - Gustavo Lacerda, Peter Spirtes, Joseph D. Ramsey, Patrik O. Hoyer:
Discovering Cyclic Causal Models by Independent Components Analysis. - Eric B. Laber, Susan A. Murphy:
Small Sample Inference for Generalization Error in Classification Using the CUD Bound. - Keith Noto, Mark Craven:
Learning Hidden Markov Models for Regression using Path Aggregation. - Ulf H. Nielsen, Jean-Philippe Pellet, André Elisseeff:
Explanation Trees for Causal Bayesian Networks. - Enrique Munoz de Cote, Michael L. Littman:
A Polynomial-time Nash Equilibrium Algorithm for Repeated Stochastic Games. - David M. Mimno, Andrew McCallum:
Topic Models Conditioned on Arbitrary Features with Dirichlet-multinomial Regression. - Kurt T. Miller, Thomas L. Griffiths, Michael I. Jordan:
The Phylogenetic Indian Buffet Process: A Non-Exchangeable Nonparametric Prior for Latent Features. - Aleksandr Simma, Moisés Goldszmidt, John MacCormick, Paul Barham, Richard Black, Rebecca Isaacs, Richard Mortier:
CT-NOR: Representing and Reasoning About Events in Continuous Time. - Stéphane Ross, Joelle Pineau:
Model-Based Bayesian Reinforcement Learning in Large Structured Domains. - Sebastian Riedel:
Improving the Accuracy and Efficiency of MAP Inference for Markov Logic. - Yan Radovilsky, Solomon Eyal Shimony:
Observation Subset Selection as Local Compilation of Performance Profiles. - Lars Otten, Rina Dechter:
Bounding Search Space Size via (Hyper)tree Decompositions. - Richard S. Sutton, Csaba Szepesvári, Alborz Geramifard, Michael Bowling:
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping. - Matthew J. Streeter, Stephen F. Smith:
New Techniques for Algorithm Portfolio Design. - Harald Steck:
Learning the Bayesian Network Structure: Dirichlet Prior versus Data. - David A. Sontag, Talya Meltzer, Amir Globerson, Tommi S. Jaakkola, Yair Weiss:
Tightening LP Relaxations for MAP using Message Passing. - Tomás Singliar, Denver Dash:
Efficient inference in persistent Dynamic Bayesian Networks. - Jarno Vanhatalo, Aki Vehtari:
Modelling local and global phenomena with sparse Gaussian processes. - Marc Toussaint, Laurent Charlin, Pascal Poupart:
Hierarchical POMDP Controller Optimization by Likelihood Maximization. - Jin Tian:
Identifying Dynamic Sequential Plans. - Peter A. Thwaites, Jim Q. Smith, Robert G. Cowell:
Propagation using Chain Event Graphs. - Daniel Tarlow, Richard S. Zemel, Brendan J. Frey:
Flexible Priors for Exemplar-based Clustering. - Haohai Yu, Robert A. van Engelen:
Refractor Importance Sampling. - Ydo Wexler, Christopher Meek:
Inference for Multiplicative Models. - Max Welling, Yee Whye Teh, Hilbert J. Kappen:
Hybrid Variational/Gibbs Collapsed Inference in Topic Models. - Chong Wang, David M. Blei, David Heckerman:
Continuous Time Dynamic Topic Models. - Michael Bowling, Martin Zinkevich:
On Local Regret. - Jinhu Liu, Chengcheng Yang, Zi-Ke Zhang:
A two-step Recommendation Algorithm via Iterative Local Least Squares. - Pranjal Awasthi, Avrim Blum, Jamie Morgenstern, Or Sheffet:
Additive Approximation for Near-Perfect Phylogeny Construction. - Srinivas Yerramalli, Rahul Jain, Urbashi Mitra:
Coalitional Games for Transmitter Cooperation in Wireless Networks. - André Platzer:
A Complete Axiomatization of Quantified Differential Dynamic Logic for Distributed Hybrid Systems. - Kexiang Ma, Yongzhao Li, Caizhi Zhu, Hailin Zhang, Feng Qi:
An Improved WBF Algorithm for Higher-Speed Decoding of LDPC Codes. - Qike Wang, Kam-Hon Tse, Lian-Kuan Chen, Soung Chang Liew:
Physical-Layer Network Coding for VPN in TDM-PON. - Siva Alagu, T. Meyyappan:
Efficient Utilization of Channels Using Dynamic Guard Channel Allocation with Channel Borrowing Strategy in Handoffs. - Zohar Feldman, Carmel Domshlak:
Online Planning in MDPs: Rationality and Optimization. - Navin Kashyap, V. Shashank, Andrew Thangaraj:
Secure Compute-and-Forward in a Bidirectional Relay. - Ola Svensson:
Hardness of Vertex Deletion and Project Scheduling. - Soumen Kanrar:
Performance Improvement of VOD System by Policy Based Traffic Handle. - Jean-Guillaume Fages, Xavier Lorca:
Improving the Asymmetric TSP by Considering Graph Structure. - Andrea Simonetto, Tamás Keviczky, Robert Babuska:
Constrained Distributed Algebraic Connectivity Maximization in Robotic Networks. -