default search action
CoRR, May 2010
- Maayan Gal-on, Shie Mannor:
Learning from Multiple Outlooks. - Bing Zeng, Xueming Tang, Ching-Fang Hsu:
A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer. - Arvind Agarwal, Hal Daumé III:
A Geometric View of Conjugate Priors. - Byung-Hak Kim, Henry D. Pfister:
On the Joint Decoding of LDPC Codes and Finite-State Channels via Linear Programming. - Amparo Fúster-Sabater, Pino Caballero-Gil:
Global Linear Complexity Analysis of Filter Keystream Generators. - Pino Caballero-Gil, Candelaria Hernández-Goya:
Secret Sharing Based on a Hard-on-Average Problem. - Pino Caballero-Gil, Amparo Fúster-Sabater:
On the Design of Cryptographic Primitives. - Amparo Fúster-Sabater, Pino Caballero-Gil:
Linear solutions for cryptographic nonlinear sequence generators. - Rania El-Badry, Ahmed K. Sultan, Moustafa Youssef:
HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks. - Ying Cui, Vincent K. N. Lau:
Distributive Stochastic Learning for Delay-Optimal OFDMA Power and Subband Allocation. - Xiaoyu Chen:
Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System. - Pino Caballero-Gil, Candelaria Hernández-Goya, Carlos Bruno-Castañeda:
A Rational Approach to Cryptographic Protocols. - Xiaohong Jia, Ron Goldman:
Using Smith Normal Forms and mu-Bases to Compute all the Singularities of Rational Planar Curves. - Pino Caballero-Gil, Amparo Fúster-Sabater, Oscar Delgado-Mohatar:
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. - Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
New Attack Strategy for the Shrinking Generator. - Tom W. Kelsey, Lars Kotthoff:
The Exact Closest String Problem as a Constraint Satisfaction Problem. - Evgeny S. Sagatov, Andrei M. Sukhov, Prasad Calyam:
Influence of distortions of key frames on video transfer in wireless networks. - Pino Caballero-Gil, Amparo Fúster-Sabater:
A Simple Attack on Some Clock-Controlled Generators. - Rahul Gupta, Sunita Sarawagi:
Joint Structured Models for Extraction from Overlapping Sources. - Pino Caballero-Gil, Candelaria Hernández-Goya:
Self-Organized Authentication in Mobile Ad-hoc Networks. - Pino Caballero-Gil, Amparo Fúster-Sabater, Maria Eugenia Pazo-Robles:
Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences. - Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody:
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks. - Shirin Jalali, Michelle Effros:
On the Separation of Lossy Source-Network Coding and Channel Coding in Wireline Networks. - Dotan Di Castro, Shie Mannor:
Adaptive Bases for Reinforcement Learning. - Dimitry S. Ananichev, Vladimir V. Gusev, Mikhail V. Volkov:
Slowly synchronizing automata and digraphs. - Jayesh Kataria, Prabhakar S. Dhekne, Sugata Sanyal:
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests. - Andriy Kovalchuk, Vyacheslav Levitsky, Igor Samolyuk, Valentyn Yanchuk:
The Formulator MathML Editor Project: User-Friendly Authoring of Content Markup Documents. - Ali Alhazmi, Abdulrahman Al-Sharawi, Bing Liu, Deyvisson Oliveira, Kanj Sobh, Max Mayantz, Robin de Bled, Yu Ming Zhang:
Software Requirements Specification of the IUfA's UUIS - a Team 4 COMP5541-W10 Project Approach. - Manish Anand, P. R. Kumar:
A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model. - Kanj Sobh, Deyvisson Oliveira, Bing Liu, Max Mayantz, Yu Ming Zhang, Ali Alhazmi, Robin de Bled, Abdulrahman Al-Sharawi:
Software Design Document, Testing, Deployment and Configuration Management, and User Manual of the UUIS -- a Team 4 COMP5541-W10 Project Approach. - Dongjie Yin, Pui King Wong, Tony T. Lee:
Analysis of Non-Persistent CSMA Protocols with Exponential Backoff Scheduling. - Nishant A. Mehta, Alexander G. Gray:
Generative and Latent Mean Map Kernels. - Houssem Jerbi, Geneviève Pujolle, Franck Ravat, Olivier Teste:
Personnalisation de Systèmes OLAP Annotés. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Personnalisation de bases de données multidimensionnelles. - Kevin Rosenblum, Lihi Zelnik-Manor, Yonina C. Eldar:
Dictionary Optimization for Block-Sparse Representations. - Frédéric Bret, Olivier Teste:
Construction graphique d'entrepôts et de magasins de données. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Algèbre OLAP et langage graphique. - Franck Ravat, Olivier Teste, Gilles Zurfluh:
Modélisation et extraction de données pour un entrepôt objet. - Gilles Hubert, Olivier Teste:
Analyse multigraduelle OLAP. - Faiza Ghozzi, Franck Ravat, Olivier Teste, Gilles Zurfluh:
Contraintes pour modèle et langage multidimensionnels. - Franck Ravat, Olivier Teste:
Modélisation et manipulation de données historisées et archivées dans un entrepôt orienté objet. - Olivier Teste:
Elaboration d'entrepôts de données complexes. - Olivier Teste:
Towards Conceptual Multidimensional Design in Decision Support Systems. - Andrea Campagna, Rasmus Pagh:
On Finding Frequent Patterns in Directed Acyclic Graphs. - Amir M. Ben-Amram:
Size-Change Termination, Monotonicity Constraints and Ranking Functions. - Wai Shing Fung, Nicholas J. A. Harvey:
Graph Sparsification by Edge-Connectivity and Random Spanning Trees. - Qiyu Sun:
Recovery of sparsest signals via ℓq-minimization. - Andri Mirzal, Masashi Furukawa:
Node-Context Network Clustering using PARAFAC Tensor Decomposition. - Moritz Wiese, Holger Boche, Igor Bjelakovic, Volker Jungnickel:
The Compound Multiple Access Channel with Partially Cooperating Encoders. - Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan:
Software Requirements Specification of the IUfA's UUIS -- a Team 1 COMP5541-W10 Project Approach. - Moazzam Islam Tiwana, Berna Sayraç, Zwi Altman:
Statistical Learning in Automated Troubleshooting: Application to LTE Interference Mitigation. - Andrea Asperti, Enrico Tassi:
Smart matching. - Christian Esteve Rothenberg, Carlos Alberto Braz Macapuna, Fábio Luciano Verdi, Maurício F. Magalhães:
The Deletable Bloom filter: A new member of the Bloom family. - Sami Akin, Mustafa Cenk Gursoy:
Performance Analysis of Cognitive Radio Systems under QoS Constraints and Channel Uncertainty. - Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse:
Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links. - Sertac Karaman, Emilio Frazzoli:
Incremental Sampling-based Algorithms for Optimal Motion Planning. - Rina Panigrahy, Kunal Talwar, Udi Wieder:
Lower Bounds on Near Neighbor Search via Metric Expansion. - Ersen Ekrem, Sennur Ulukus:
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel. - Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho:
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits. - Samuel Bucheli, Roman Kuznets, Thomas Studer:
Explicit Evidence Systems with Common Knowledge. - Tirza Routtenberg, Joseph Tabrikian:
Classes of lower bounds on outage error probability and MSE in Bayesian parameter estimation. - Luc Dartois, Manfred Kufleitner, Alexander Lauser:
Rankers over Infinite Words. - Endre Csóka:
Maximum flow is approximable by deterministic constant-time algorithm in sparse networks. - Amir M. Ben-Amram:
On Decidable Growth-Rate Properties of Imperative Programs. 1-14 - Guillaume Bonfante:
Observation of implicit complexity by non confluence. 15-29 - Ugo Dal Lago, Simone Martini, Margherita Zorzi:
General Ramified Recurrence is Sound for Polynomial Time. 47-62 - Luca Roversi, Luca Vercelli:
Safe Recursion on Notation into a Light Logic by Levels. 63-77 - Aloïs Brunel, Kazushige Terui:
Church => Scott = Ptime: an application of resource sensitive realizability. 31-46 - Mohak Shah, Mario Marchand, Jacques Corbeil:
Feature Selection with Conjunctions of Decision Stumps and Learning from Microarray Data. - Arash Behboodi, Pablo Piantanida:
Capacity of a Class of Broadcast Relay Channels. - Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan:
Software Design Document, Testing, and Deployment and Configuration Management of the UUIS - a Team 1 COMP5541-W10 Project Approach. - Manuel Kauers, Veronika Pillwein:
When can we decide that a P-finite sequence is positive? - Manuel Kauers, Carsten Schneider:
Partial Denominator Bounds for Partial Linear Difference Equations. - Vladimir L. Gavrikov, Rem G. Khlebopros:
An approach to visualize the course of solving of a research task in humans. - Kurt Ammon:
Informal Concepts in Machines. - Ahmed Daoudi, David Zerkler, Gay Hazan, Isabelle Toutant, Mariano Diaz, René Toutant, Virginia Cook, William Nzoukou, Yassine Amaiche:
Software Requirements Specification of the IUfA's UUIS -- a Team 3 COMP5541-W10 Project Approach. - Xiang He, Aylin Yener:
The Gaussian Many-to-1 Interference Channel with Confidential Messages. - Andrew Drucker:
Improved Direct Product Theorems for Randomized Query Complexity. - Patrick Baillot:
Proceedings International Workshop on Developments in Implicit Computational complExity, DICE 2010, Paphos, Cyprus, 27-28th March 2010. EPTCS 23, 2010 [contents] - Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing. - Daniel Golovin:
The B-Skip-List: A Simpler Uniquely Represented Alternative to B-Trees. - Omer Shahid Ahmad, Faisal Alrashdi, Jason Jun-Duo Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu:
Software Design Document, Testing, Deployment and Configuration Management of the UUIS--a Team 2 COMP5541-W10 Project Approach. - Ramesh Hariharan, Debmalya Panigrahi:
A Linear-time Algorithm for Sparsification of Unweighted Graphs. - Sándor P. Fekete, Christiane Schmidt, Axel Wegener, Horst Hellbrück, Stefan Fischer:
Empowered by Wireless Communication: Self-Organizing Traffic Collectives. - Kasra Alishahi, Shayan Dashmiz, Pedram Pad, Farrokh Marvasti, M. H. Shafinia, M. S. Mansouri:
The Enigma of CDMA Revisited. - Jaeok Park, Mihaela van der Schaar:
Adaptive MAC Protocols Using Memory for Networks with Critical Traffic. - Mohammad Iqbal Bin Shahid, Joarder Kamruzzaman:
Weighted Soft Decision for Cooperative Sensing in Cognitive Radio Networks. - Jacques M. Bahi, Christophe Guyeux:
A chaos-based approach for information hiding security. - Christophe Guyeux, Nicolas Friot, Jacques M. Bahi:
Chaotic iterations versus Spread-spectrum: chaos and stego security. - Loet Leydesdorff:
The Production of Probabilistic Entropy in Structure/Action Contingency Relations. - Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis. - Zoran Hadzi-Velkov, Nikola Zlatanov:
Outage rates and outage durations of opportunistic relaying systems. - Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis:
An efficient approximation to the correlated Nakagami-m sums and its application in equal gain diversity receivers. - Mathieu Baudet, Véronique Cortier, Stéphanie Delaune:
YAPA: A generic tool for computing intruder knowledge. - Jónathan Heras, Vico Pascual, Ana Romero, Julio Rubio:
Integrating multiple sources to answer questions in Algebraic Topology. - Nirmalendu Bikas Sinha, Manish sonal, Makar Chand Snai, R. Bera, Monojit Mitra:
Modelling and Implementation of ITWS: An ultimate solution to ITS. - David Auger, Irène Charon, Olivier Hudry, Antoine Lobstein:
Watching Systems in graphs: an extension of Identifying Codes. - Vincent Y. F. Tan, Animashree Anandkumar, Alan S. Willsky:
Learning High-Dimensional Markov Forest Distributions: Analysis of Error Rates. - Lamjed Touil, Abdessalem Ben Abdelali, Abdellatif Mtibaa, El-Bey Bourennane:
Towards Hardware implementation of video applications in new telecommunications devices. - Omer Shahid Ahmad, Faisal Alrashdi, Jason Jun-Duo Chen, Najah Ilham, Jianhai Lu, Yiwei Sun, Tong Wang, Yongxin Zhu:
Software Requirements Specification of the IUfA's UUIS -- a Team 2 COMP5541-W10 Project Approach. - Andy B. Yoo, Yang Liu, Sheila Vaidya, Stephen Poole:
A New Benchmark For Evaluation Of Graph-Theoretic Algorithms. - Sumit Ganguly, Purushottam Kar:
On Estimating the First Frequency Moment of Data Streams. - Robert S. Weigel, Doug M. Lindholm, Anne Wilson, Jeremy Faden:
TSDS: high-performance merge, subset, and filter software for time series-like data. - Sylvie Boldo, François Clément, Jean-Christophe Filliâtre, Micaela Mayero, Guillaume Melquiond, Pierre Weis:
Formal Proof of a Wave Equation Resolution Scheme: the Method Error. - Daniil Ryabko:
Clustering processes. - Jean-Guillaume Dumas, Thierry Gautier, Jean-Louis Roch:
Generic design of Chinese remaindering schemes. - Roberto M. Amadio, Patrick Baillot, Antoine Madet:
An affine-intuitionistic system of types and effects: confluence and termination. - Chris Armbruster, Laurent Romary:
Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository systems and institutional repositories in serving scholarly communication. - Yassine Amaiche, Virginia Cook, Ahmed Daoudi, Mariano Diaz, Gay Hazan, David Zerkler, William Nzoukou, Isabelle Toutant, René Toutant:
Software Design Document, Testing, Deployment and Configuration Management of the IUfA's UUIS -- a Team 3 COMP5541-W10 Project Approach. - Won-Yong Shin, Daniel Enrique Lucani, Muriel Médard, Milica Stojanovic, Vahid Tarokh:
On Capacity Scaling of Underwater Networks: An Information-Theoretic Perspective. - Teng Zhang, Arthur Szlam, Yi Wang, Gilad Lerman:
Randomized hybrid linear modeling by local best-fit flats. - Martianus Frederic Ezerman, San Ling, Patrick Solé, Olfa Yemen:
From Skew-Cyclic Codes to Asymmetric Quantum Codes. - Yi Su, Mihaela van der Schaar:
Structural Solutions For Additively Coupled Sum Constrained Games. - Jean-Marc Tacnet, Mireille Batton-Hubert, Jean Dezert:
A two-step fusion process for multi-criteria decision applied to natural hazards in mountains. - Pantelis Bouboulis, Sergios Theodoridis:
The Complex Gaussian Kernel LMS algorithm. - Pantelis Bouboulis, Sergios Theodoridis:
Extension of Wirtinger Calculus in RKH Spaces and the Complex Kernel LMS. - Yechang Fang, Kang Yen, Deng Pan, Zhuo Sun:
Buffer Management Algorithm Design and Implementation Based on Network Processors. - Yasser M. Alginaih, Abdul Ahad Siddiqi:
Multistage Hybrid Arabic/Indian Numeral OCR System. - Richard P. Brent:
George Forsythe's last paper. - Haim Kaplan, Natan Rubin, Micha Sharir:
A Kinetic Triangulation Scheme for Moving Points in The Plane. - Agnieszka Rowinska-Schwarzweller, Christoph Schwarzweller:
On Building a Knowledge Base for Stability Theory. - Dewan Md. Farid, Mohammad Zahidur Rahman:
Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection. - Patrizio Frosini, Claudia Landi:
No embedding of the automorphisms of a topological space into a compact metric space endows them with a composition that passes to the limit. - Asgarali Bouyer, Mohammad Javad hoseyni, Abdul Hanan Abdullah:
Improving Overhead Computation and pre-processing Time for Grid Scheduling System. - Maman Abdurohman, Kuspriyanto, Sarwono Sutikno, Arif Sasongko:
The New Embedded System Design Methodology For Improving Design Process Performance. - Md. Golam Kaosar, Xun Yi:
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices. - S. Malathy, G. Sudha Sadhasivam, K. Murugan, S. Lokesh:
Adaptive Slot Allocation And Bandwidth Sharing For Prioritized Handoff Calls In Mobile Netwoks. - Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta:
An Efficient Vein Pattern-based Recognition System. - Adam Grabowski, Christoph Schwarzweller:
On Duplication in Mathematical Repositories. - S. Vijay Bhanu, R. M. Chandrasekaran, V. Balakrishnan:
Effective Bandwidth Utilization in IEEE802.11 for VOIP. - S. Karpagachelvi, M. Arthanari, M. Sivakumar:
ECG Feature Extraction Techniques - A Survey Approach. - H. S. Aravinda, H. D. Maheshappa, Ranjan Moodithaya:
Implementation of the Six Channel Redundancy to achieve fault tolerance in testing of satellites. - M. Umamaheswari, S. Sivasubramanian:
Performance Oriented Query Processing In GEO Based Location Search Engines. - Manish Kumar, M. C. Srivastava, Umesh Kumar:
Tunable Multifunction Filter Using Current Conveyor. - Bikrampal Kaur, Himanshu Aggarwal:
Artificial Neural Network based Diagnostic Model For Causes of Success and Failures. - J. Visumathi, K. L. Shunmuganathan:
Detecting Security threats in the Router using Computational Intelligence. - Sunil F. Rodd, Umakanth P. Kulkarni:
Adaptive Tuning Algorithm for Performance tuning of Database Management System. - Rakesh Kumar Jha, A. Wankhede Vishal, Upena D. Dalal:
A Survey of Mobile WiMAX IEEE 802.16m Standard. - György Elekes, Micha Sharir:
Incidences in Three Dimensions and Distinct Distances in the Plane. - David Sevilla, Daniel Wachsmuth:
Polynomial integration on regions defined by a triangle and a conic. - Stasys Jukna, Georg Schnitger:
Min-Rank Conjecture for Log-Depth Circuits. - Hermann von Issendorff:
Programming Discrete Physical Systems. - Matthew T. Dickerson, Michael T. Goodrich, Thomas D. Dickerson:
Round-Trip Voronoi Diagrams and Doubling Density in Geographic Networks. - Vineet Abhishek, Bruce E. Hajek:
Revenue Optimal Auction for Single-Minded Buyers. - Michael Lentmaier, David G. M. Mitchell, Gerhard P. Fettweis, Daniel J. Costello Jr.:
Asymptotically Regular LDPC Codes with Linear Distance Growth and Thresholds Close to Capacity. - David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr.:
New Families of LDPC Block Codes Formed by Terminating Irregular Protograph-Based LDPC Convolutional Codes. - (Withdrawn) Estimating small moments of data stream in nearly optimal space-time.
- Vineet Abhishek, Bruce E. Hajek:
Efficiency Loss in Revenue Optimal Auctions. - (Withdrawn) Estimating small frequency moments of data stream: a characteristic function approach.
- Manuel Bodirsky, Peter Jonsson, Timo von Oertzen:
Horn versus full first-order: complexity dichotomies in algebraic constraint satisfaction. - Xin Wang, Chenyang Yang:
Decentralized Estimation over Orthogonal Multiple-access Fading Channels in Wireless Sensor Networks - Optimal and Suboptimal Estimators. - Julien Bringer, Hervé Chabanne:
Negative Databases for Biometric Data. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
The Impact of Topology on Byzantine Containment in Stabilization. - Fernando G. Lobo, Marielba Zacarias, Paulo A. Condado, Teresa Romão, Rui Godinho, Manuel Moreno:
Evaluating Accessible Synchronous CMC Applications. - Richard P. Brent:
A Simple Approach to Error Reconciliation in Quantum Key Distribution. - Julien Cohen, Rémi Douence:
Views, Program Transformations, and the Evolutivity Problem. - Ayfer Özgür, Suhas N. Diggavi:
Approximately achieving Gaussian relay network capacity with lattice codes. - Marc Harper:
The Beauty Contest Game, a population-centric approach. - Richard P. Brent:
The myth of equidistribution for high-dimensional simulation. - Axel Legay, Benoît Delahaye:
Statistical Model Checking : An Overview. - Xi Liu, Elza Erkip:
Coordination and Bargaining over the Gaussian Interference Channel. - Jacek Gwizdka:
Distribution of Cognitive Load in Web Search. - Ali Al-Bashabsheh, Yongyi Mao, Abbas Yongaçoglu:
On Holant Theorem and Its Proof. - Sami Akin, Mustafa Cenk Gursoy:
Cognitive Radio Transmission under QoS Constraints and Interference Limitations. - ArunKumar Jayaprakasam, Vinod Sharma, Chandra R. Murthy, Prashant Narayanan:
Cooperative Sequential Spectrum Sensing Algorithms for OFDM. - Amit Weinstein:
Simultaneous communication in noisy channels. - Juan Dominguez-Montes:
Solution to the Counterfeit Coin Problem and its Generalization. - Leonardo Ermann, Alexei D. Chepelianskii, D. L. Shepelyansky:
Fractal Weyl law for Linux Kernel Architecture. - Youssef Elfoutayeni, Mohamed Khaladi:
Using vector divisions in solving linear complementarity problem. - Amir Finkelstein:
The Theory Behind The "Summed Area Tables" Algorithm: A Simple Approach To Calculus. - Daniel James Shepherd:
Quantum Complexity: restrictions on algorithms and architectures. - Jose Mathew Manimala:
RAmM Algorithm(Simplex). - Jean-Gabriel Kammerer, Reynald Lercier, Guénaël Renault:
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. - Julien Cohen, Jean-Louis Giavitto, Olivier Michel:
Variable elimination for building interpreters. - Karin Schnass, Pierre Vandergheynst:
Classification via Incoherent Subspaces. - Jean-Vincent Loddo, Luca Saiu:
How to correctly prune tropical trees. - Shekhar S. Chandra:
Fast Digital Convolutions using Bit-Shifts. - Stefan Leijnen, Liane Gabora:
An Agent-based Simulation of the Effectiveness of Creative Leadership. - Liane Gabora:
Recognizability of Individual Creative Style Within and Across Domains: Preliminary Studies. - Sergey Bezzateev, Natalia A. Shekhunova:
Cumulative-Separable Codes. - Yufeng Li, Zhi-Hua Zhou:
S4VM: Safe Semi-Supervised Support Vector Machine. - Laszlo B. Kish, Sunil P. Khatri, Tamás Horváth:
Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel. - Gianluigi Greco, Francesco Scarcello:
On The Power of Tree Projections: Structural Tractability of Enumerating CSP Solutions. - K. Raj Kumar, Giuseppe Caire:
Channel State Feedback over the MIMO-MAC. - Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar, Kannan Ramchandran:
The MISER Code: An MDS Distributed Storage Code that Minimizes Repair Bandwidth for Systematic Nodes through Interference Alignment. - Hossein Bagheri, Abolfazl S. Motahari, Amir K. Khandani:
The Approximate Capacity Region of the Gaussian Z-Interference Channel with Conferencing Encoders. - John Scoville:
On Macroscopic Complexity and Perceptual Coding. - Ohad N. Feldheim, Rani Hod:
3/2 Firefighters are not enough. - Abdullah Gharaibeh, Samer Al-Kiswany, Matei Ripeanu:
CrystalGPU: Transparent and Efficient Utilization of GPU Power. - Meng Zeng, Rui Zhang, Shuguang Cui:
On Design of Distributed Beamforming for Two-Way Relay Networks. - Sang-Woon Jeon, Sae-Young Chung, Syed Ali Jafar:
Approximate Capacity of a Class of Multi-source Gaussian Relay Networks. - Christian Drescher, Martin Gebser, Benjamin Kaufmann, Torsten Schaub:
Heuristics in Conflict Resolution. - Stanislav Nonchev, Mikko Valkama:
Advanced Radio Resource Management for Multi Antenna Packet Radio Systems. - M. Rajesh Babu, S. Selvan:
A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks. - Kavi Kumar Khedo, Rajiv Perseedoss, Avinash Mungur:
A Wireless Sensor Network Air Pollution Monitoring System. - A. Sivagami, K. Pavai, D. Sridharan, S. A. V. Satya Murty:
Energy and Link Quality Based Routing for Data Gathering Tree in Wireless Sensor Networks Under TINYOS - 2.X. - Emmanouil A. Panaousis, Tipu Arvind Ramrekha, Grant P. Millar, Christos Politis:
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks. - R. Manoharan, E. Ilavarasan:
Impact of Mobility on the Performance of Multicast Routing Protocols in MANET. - Dan J. Shepherd:
Binary Matroids and Quantum Probability Distributions. - Salman Abdul Moiz, Lakshmi Rajamani:
A Real Time Optimistic Strategy to achieve Concurrency Control in Mobile Environments Using On-demand Multicasting. - Abdelsalam B. Amer, Fayez Gebali:
General Model for Infrastructure Multi-channel Wireless LANs. - N. Ch. Sriman Narayana Iyengar, Syed Mohammad Ansar Sachin kumar, Piyush Nagar, Siddharth Sharma, Akshay Atrey:
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks. - Meriem Abid, Tara Ali-Yahiya, Guy Pujolle:
On the Minimization of Handover Decision Instability in Wireless Local Area Networks. - Kiarash Mizanian, Mehdi Vasef, Morteza Analoui:
Bandwidth Modeling and Estimation in Peer to Peer Networks. - Ubaid Abbasi, Toufik Ahmed:
Architecture for Cooperative Prefetching in P2P Video-on- Demand System. - Ayman Khalil, Matthieu Crussière, Jean-François Hélard:
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN. - Soumen Kanrar, Mohammad Siraj:
Class Based Admission Control by Complete Partitioning -Video on Demand Server. - Amparo Fúster-Sabater, Pino Caballero-Gil:
On the Use of Cellular Automata in Symmetric Cryptography. - Yipeng Liu, Qun Wan:
Sidelobe Suppression for Robust Beamformer with The Improved Block-Sparse Constraint. - Nitiket N. Mhala, N. K. Choudhari:
An Envision of Low Cost Mobile Adhoc Network Test Bed in a Laboratory Environment Emulating an Actual MANET. - Yipeng Liu, Qun Wan, Xiaoli Chu:
Power-Efficient Ultra-Wideband Waveform Design Considering Radio Channel Effects. - Yipeng Liu, Qun Wan:
Sparse Support Recovery with Phase-Only Measurements. - Yipeng Liu, Qun Wan:
Robust Compressive Wideband Spectrum Sensing with Sampling Distortion. - Yipeng Liu, Qun Wan:
Compressive Wideband Spectrum Sensing for Fixed Frequency Spectrum Allocation. - Benjamin Steinberg:
The Cerny conjecture for one-cluster automata with prime length cycle. - Martin Mann, Alessandro Dal Palù:
Lattice model refinement of protein structures. - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. - Marek Petrik, Gavin Taylor, Ronald Parr, Shlomo Zilberstein:
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes. - Fernando Hernando, Michael E. O'Sullivan, Emanuel M. Popovici, Shraddha Srivastava:
Subfield-Subcodes of Generalized Toric codes. - Jo Stanley, Gerard Briscoe:
The ABC of Digital Business Ecosystems. - Abhinav Pandey, Akash Pandey, Ankit Tandon, Brajesh Kr Maurya, Upendra Kushwaha, Madhvendra Mishra, Vijayshree Tiwari:
Cloud Computing: Exploring the scope. - Alexey V. Chernov, Fedor Zhdanov:
Prediction with Expert Advice under Discounted Loss. - Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Information Hiding Using Improper Frame Padding. - Michael L. Wick, Andrew McCallum, Gerome Miklau:
Scalable Probabilistic Databases with Factor Graphs and MCMC. - Sandipan Dey, Hameed Al-Qaheri, Suneeta Sane, Sugata Sanyal:
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding. - G. F. Ali Ahammed, Reshma Banu:
Analyzing the Performance of Active Queue Management Algorithms. - Ioannis Z. Emiris, André Galligo, Elias P. Tsigaridas:
Random polynomials and expected complexity of bisection methods for real solving. - Hamidreza Mahini, Reza Berangi, Alireza Mahini:
MLET: A Power Efficient Approach for TCAM Based, IP Lookup Engines in Internet Routers. - Sarbani Roy, Saikat Halder, Nandini Mukherjee:
A Multi-agent Framework for Performance Tuning in Distributed Environment. - Ajanta De Sarkar, Sarbani Roy, Sudipto Biswas, Nandini Mukherjee:
An Integrated Framework for Performance Analysis and Tuning in Grid Environment. - Hafedh Zayani, Kamel Barkaoui, Rahma Ben Ayed:
Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol. - Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis, Robert Schober:
Cooperative Diversity with Mobile Nodes: Outage Capacity Rates and Durations. - Serguei A. Mokhov, Mashrur Mia, Petr Solodov, Kai Zhao, Jihed Halimi:
A UI Design Case Study and a Prototype of a Travel Search Engine. - Zoltán Ésik, Andreas Maletti:
Simulations of Weighted Tree Automata. - Petr N. Vabishchevich:
On a new class of additive (splitting) operator-difference schemes. - Haoyang Wu:
Two examples to break through classical theorems on Nash implementation with two agents. - Ankan Saha, Ambuj Tewari:
On the Finite Time Convergence of Cyclic Coordinate Descent Methods. - Zhongmou Li, Hui Xiong, Yanchi Liu:
Detecting Blackholes and Volcanoes in Directed Networks. - Min Chih Lin, Francisco J. Soulignac, Jayme Luiz Szwarcfiter:
Arboricity, h-Index, and Dynamic Algorithms. - Adrian Dumitrescu, János Pach:
Opaque sets. - Félix de Moya-Anegón, Victor Herrero Solana:
Worldwide topology of the scientific subject profile: a macro approach on the country level. - Huan Xu, Shie Mannor:
Robustness and Generalization. - Tong Zhang:
Sparse Recovery with Orthogonal Matching Pursuit under RIP. - Onur Sahin, Osvaldo Simeone, Elza Erkip:
Interference Channel with a Half-Duplex Out-of-Band Relay. - (Withdrawn) On The Topology of a Boolean Function.
- Guan Gui, Wei Peng, Qun Wan, Fumiyuki Adachi:
A Fast Compressive Channel Estimation with Modified Smoothed L0 Algorithm. - Guan Gui, An-min Huang, Qun Wan:
Sparse Multipath Channel Estimation using DS Algorithm in Wideband Communication Systems. - Guan Gui, Qun Wan, Wei Peng, Fumiyuki Adachi:
Sparse Multipath Channel Estimation Using Compressive Sampling Matching Pursuit Algorithm. - Amparo Fúster-Sabater, L. Javier García-Villalba:
Likelihood that a pseudorandom sequence generator has optimal properties. - Amparo Fúster-Sabater, Pedro García-Mochales:
A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators. - Amparo Fúster-Sabater, Dolores de la Guía-Martínez:
Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata. - Greg Cohen:
A new algebraic technique for polynomial-time computing the number modulo 2 of Hamiltonian decompositions and similar partitions of a graph's edge set. - Nicolò Cesa-Bianchi, Shai Shalev-Shwartz, Ohad Shamir:
Online Learning of Noisy Data with Kernels. - Nicolò Maria Calcavecchia, Elisabetta Di Nitto:
Incorporating prediction models in the SelfLet framework: a plugin approach. - Vladimir Kolmogorov:
Generalized roof duality and bisubmodular functions. - Edwin A. Henneken, Michael J. Kurtz, Alberto Accomazzi, Carolyn Stern-Grant, Donna M. Thompson, Elizabeth Bohlen, Giovanni Di Milia, Jay Luker, Stephen S. Murray:
Finding Your Literature Match -- A Recommender System. - Richard P. Brent:
Some comments on C. S. Wallace's random number generators. - Patrick Mitran:
Typical Sequences for Polish Alphabets. - Stephen L. Bloom, YiDi Zhang:
A Note on Ordinal DFAs. - James Brotherston, Cristiano Calcagno:
Classical BI: Its Semantics and Proof Theory. - Volker Nannen:
A Short Introduction to Model Selection, Kolmogorov Complexity and Minimum Description Length (MDL). - Li Erran Li, Michael F. Nowlan, Y. R. Yang:
Mosaic: Policy Homomorphic Network Extension. - Jean-Louis Krivine:
Realizability algebras: a program to well order R. - Volker Nannen:
A Short Introduction to Kolmogorov Complexity. - Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, Pablo A. Parrilo:
Flows and Decompositions of Games: Harmonic and Potential Games. - Ernest Kurniawan, Sumei Sun, Kai Yen, Kai Fong Ernest Chong:
Network Coded Transmission of Fountain Codes over Cooperative Relay Networks. - Michael Drew Lamar:
Split digraphs. - Vadim R. Madgazin:
Dichotic harmony for the musical practice. - Nomica Imran, Imran Rao:
A Trustworthy and well-organized data disseminating scheme for ad-hoc wsns. - S. Sanyal, S. Iyengar, A. A. Roy, N. N. Karnik, N. M. Mengale, S. B. Menon, Wu Geng Feng:
Defuzzification Method for a Faster and More Accurate Control. - Jesús Martínez-Mateo, Susana Muñoz-Hernández, David Pérez-Rey:
A Discussion of Thin Client Technology for Computer Labs. - Quanquan Liang, Mingyan Liu:
Channel Estimation for Opportunistic Spectrum Access: Uniform and Random Sensing. - Alejandro Cornejo, Fabian Kuhn:
Deploying Wireless Networks with Beeps. - Kamran Karimi, Neil G. Dickson, Firas Hamze:
A Performance Comparison of CUDA and OpenCL. - Andri Mirzal, Masashi Furukawa:
Eigenvectors for clustering: Unipartite, bipartite, and directed graph cases. - Tugkan Batu, Petra Berenbrink, Colin Cooper:
Chains-into-Bins Processes. - Jin-yi Cai, Xi Chen, Richard J. Lipton, Pinyan Lu:
On Tractable Exponential Sums. - Stephen A. Cook, Pierre McKenzie, Dustin Wehr, Mark Braverman, Rahul Santhanam:
Pebbles and Branching Programs for Tree Evaluation. - Chen Feng, Danilo Silva, Frank R. Kschischang:
An Algebraic Approach to Physical-Layer Network Coding. - Saber Jafarizadeh:
Fastest Distributed Consensus Averaging Problem on Perfect and Complete n-ary Tree networks. - Carst Tankink, Herman Geuvers, James McKinna, Freek Wiedijk:
Proviola: A Tool for Proof Re-animation. - Andrei A. Bulatov, Martin E. Dyer, Leslie Ann Goldberg, Markus Jalsenius, Mark Jerrum, David Richerby:
The complexity of weighted and unweighted #CSP. - Si-Hyeon Lee, Sae-Young Chung:
Capacity of a Class of Multicast Tree Networks. - Georgios Tzimiropoulos, Stefanos Zafeiriou:
On the Subspace of Image Gradient Orientations. - Avner Magen, Anastasios Zouzias:
Low Rank Matrix-Valued Chernoff Bounds and Applications. - Wei Hou, Lin Zhang, Lei Yang, Heather Zheng, Xiuming Shan:
Cross-Band Interference Considered Harmful in OFDM Based Distributed Spectrum Sharing. - Eran Hof, Shlomo Shamai:
Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels. - Eran Hof, Igal Sason, Shlomo Shamai:
Polar Coding for Reliable Communications over Parallel Channels. - Jan Vondrák:
A note on concentration of submodular functions. - Miguel Nicolau, Marc Schoenauer, Wolfgang Banzhaf:
Evolving Genes to Balance a Pole. - Éric Sopena:
Upper oriented chromatic number of undirected graphs and oriented colorings of product graphs. - Frédéric Didier, Thomas A. Henzinger, Maria Mateescu, Verena Wolf:
SABRE: A Tool for Stochastic Analysis of Biochemical Reaction Networks. - Tamaghna Acharya, Samiran Chattopadhyay, Rajarshi Roy:
Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks. - Orest Shardt, John C. Bowman:
Surface Parametrization of Nonsimply Connected Planar Bézier Regions. - Andreas-Stephan Elsenhans, Axel Kohnert, Alfred Wassermann:
Construction of Codes for Network Coding. - Gregory Z. Gutin, Anders Yeo:
Note on Maximal Bisection above Tight Lower Bound. - Tirza Routtenberg, Joseph Tabrikian:
General Classes of Lower Bounds on the Probability of Error in Multiple Hypothesis Testing. - Nadjib Lazaar, Arnaud Gotlieb, Yahia Lebbah:
On Testing Constraint Programs. - Fabian Kuhn, Christoph Lenzen, Thomas Locher, Rotem Oshman:
Optimal Gradient Clock Synchronization in Dynamic Networks. - Ali Assaf, Alejandro Díaz-Caro, Simon Perdrix, Christine Tasson, Benoît Valiron:
Call-by-value, call-by-name and the vectorial behaviour of the algebraic λ-calculus. - Zoran Hadzi-Velkov, Boris Spasenovski:
Saturation Throughput - Delay Analysis of IEEE 802.11 DCF in Fading Channel. - Stefano Berardi, Ugo de'Liguoro:
Interactive Realizers and Monads. - S. Iyengar, N. Apte, A. A. Roy, S. Sanyal, Navin M. Singhi, Wu Geng Feng:
A Multiprocessor Communication Architecture For High Speed Networks. - Amina Chebira, Matthew Fickus, Dustin G. Mixon:
Filter Bank Fusion Frames. - Richard Altendorfer:
Observable dynamics and coordinate systems for vehicle tracking. - (Withdrawn) A Proof for P vs. NP Problem.
- Noah D. Stein, Pablo A. Parrilo, Asuman E. Ozdaglar:
A new proof of Nash's Theorem via exchangeable equilibria. - S. M. Nazrul Alam, Zygmunt J. Haas:
Hierarchical and Nonhierarchical Three-Dimensional Underwater Wireless Sensor Networks. - Zhiqiang Xu:
A remark about orthogonal matching pursuit algorithm. - Petros Drineas, Michael W. Mahoney:
Effective Resistances, Statistical Leverage, and Applications to Linear Equation Solving. - Pino Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya, Cándido Caballero-Gil:
Stimulating Cooperation in Self-Organized Vehicular Networks. - Katerina J. Argyraki, Petros Maniatis, Ankit Singla:
Verifiable Network-Performance Measurements. - Ruhollah Tavakoli:
Improvement Cache Efficiency of Explicit Finite Element Procedure and its Application to Parallel Casting Solidification Simulation. - Andreas Neu:
Virtual Texturing. - Sylvain Marlière, Daniela Urma, Jean-Loup Florens, Florence Marchi:
Multi-sensorial interaction with a nano-scale phenomenon : the force curve. - Nicolas Castagné, Claude Cadoz, Jean-Loup Florens, Annie Luciani:
Haptics in computer music : a paradigm shift. - Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna, Mihail Bakaev:
Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary. - Jean-Loup Florens, Alina Voda, Daniela Urma:
Dynamical issues in interactive representation of physical objects. - Annie Luciani:
From granular avalanches to fluid turbulences through oozing pastes. A mesoscopic physically-based particle model. - Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya:
Flexible Authentication in Vehicular Ad hoc Networks. - Savas Konur:
A Survey on Temporal Logics. - Savas Konur:
Real-time and Probabilistic Temporal Logics: An Overview. - Amparo Fúster-Sabater:
Cellular Automata in Stream Ciphers. - Derrick Wing Kwan Ng, Vincent Kin Nang Lau:
Power Control and Performance Analysis of Outage-Limited Cellular Network with MUD-SIC and Macro-Diversity. - David Pritchard:
An LP with Integrality Gap 1+epsilon for Multidimensional Knapsack. - Changho Suh, David Tse:
Feedback Capacity of the Gaussian Interference Channel to within 2 Bits. - Yipeng Liu, Qun Wan:
Digital Ultra-Wideband Beamformer Based on Minimum Variance Multi-Frequency Distortionless Restriction. - Swan Dubois, Toshimitsu Masuzawa, Sébastien Tixeuil:
Self-stabilization with Byzantine tolerance for global tasks. - Raphaël Cerf:
Critical control of a genetic algorithm. - Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil, Candelaria Hernández-Goya:
Self-Organized Authentication Architecture for Mobile Ad-hoc Networks. - Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford:
Efficient System-Enforced Deterministic Parallelism. - Alka:
Efficient Algorithms and Data Structures for Massive Data Sets. - Prasad Chebolu, Mary Cryan, Russell A. Martin:
Exact counting of Euler Tours for generalized series-parallel graphs. - Jens Zumbrägel, Mark F. Flanagan, Vitaly Skachek:
Exploration of AWGNC and BSC Pseudocodeword Redundancy. - Lars Kotthoff, Ian P. Gent, Ian Miguel:
Using machine learning to make constraint solver implementation decisions. - Reza Khosravi-Farsani:
Two-Way Writing on Dirty Paper. - Varun Kanade, Leslie G. Valiant, Jennifer Wortman Vaughan:
Evolution with Drifting Targets. - Neri Merhav:
Threshold effects in parameter estimation as phase transitions in statistical mechanics. - Shai Shalev-Shwartz, Ohad Shamir, Karthik Sridharan:
Learning Kernel-Based Halfspaces with the Zero-One Loss. - Weiyu Xu, Babak Hassibi:
Compressive Sensing over the Grassmann Manifold: a Unified Geometric Framework. - Jordi Levy, Mateu Villaret:
Nominal Unification from a Higher-Order Perspective. - Guozhang Wang, Marcos Antonio Vaz Salles, Benjamin Sowell, Xun Wang, Tuan Cao, Alan J. Demers, Johannes Gehrke, Walker M. White:
Behavioral Simulations in MapReduce. - Fei Li:
A Better Memoryless Online Algorithm for FIFO Buffering Packets with Two Values. - Ruiming Yang, Qun Wan, Yipeng Liu, Wan-Lin Yang:
Improved OMP Approach to Sparse Multi-path Channel Estimation via Adaptive Inter-atom Interference Mitigation. - Shiro Ikeda, Kazunori Hayashi, Toshiyuki Tanaka:
Capacity and Modulations with Peak Power Constraint. - Nabil Hathout:
Morphonette: a morphological network of French. - Gilson O. dos Santos, Francisco M. de Assis, Aércio Ferreira de Lima:
A Scheme of Concatenated Quantum Code to Protect against both Computational Error and an Erasure. - Branko Malesevic, Ivana Jovovic, Milan Campara:
Groebner bases in Java with applications in computer graphics. - Mustapha Bahich, Mohamed Afifi, Elmostafa Barj:
Optical phase extraction algorithm based on the continuous wavelet and the Hilbert transforms. - Marisa R. De Giusti, Gonzalo L. Villarreal, Agustín Vosou, Juan P. Martínez:
An Ontology-based Context Aware System for Selective Dissemination of Information in a Digital Library. - E. Jenefa JebaJothi, V. Kavitha, T. Kavitha:
Contention Based Routing in Mobile Ad Hoc Networks with Multiple Copies. - Pariza Kamboj, A. K. Sharma:
Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP). - Sattar J. Aboud:
Criticism of Knapsack Encryption Scheme. - Sami Halawani, Abdul Waheed Khan:
Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks - A Survey. - Gilbert Phuah Leong Siang, Nor Azman Ismail, Pang Yee Yong:
A Study on Potential of Integrating Multimodal Interaction into Musical Conducting Education. - A. N. Omara, Sherine M. Abd El-Kader, Hussein Sherif Eissa, Salwa H. El-Ramly:
A Prioritized Access Point Algorithm for 802.11b Networks in a Lossy Environment. - Bostan I:
Democracy, essential element of the electronic government. - M. Dinakaran, P. Balasubramanie:
A Route Optimization technique for registered and unregistered CN's in NEMO. - (Withdrawn) A grid environment consisting of heterogeneous compute resources for high performance computation.
- Salem Saleh Al-amri, Namdeo V. Kalyankar, Khamitkar S. D.:
Image Segmentation by Using Threshold Techniques. - P. V. G. D. Prasad Reddy, K. Rama Sudha, Rama Sree P., Ramesh S. N. S. V. S. C.:
Software Effort Estimation using Radial Basis and Generalized Regression Neural Networks. - Manas Ranjan Pradhan, E. G. Rajan:
Molecular Programming Pseudo-code Representation to Molecular Electronics. - Himani Bathla, Kanika Lakhani:
A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network. - Siddharths Sankar Biswas:
A Soft Computing Model for Physicians' Decision Process. - Ali K. Hmood, Mussab alaa Zaidan, Hamdan O. Alanazi, Rami Alnaqeib, Yahya Al-Nabhani:
Dissertations Repository System Using Context Module. - Rami Alnaqeib, Hamdan O. Alanazi, Hamid Abdullah Jalab, Mussab alaa Zaidan, Ali K. Hmood:
Internet Banking System Prototype. - Hamdan O. Alanazi, Rami Alnaqeib, Ali K. Hmood, Mussab alaa Zaidan, Yahya Al-Nabhani:
On the Module of Internet Banking System. - Monika Sharma, Ashwani Mehra, Haresh Jola, Anand Kumar, Madhvendra Misra, Vijayshri Tiwari:
Scope of cloud computing for SMEs in India. - Surender Kumar Soni, Narottam Chand:
Energy Efficient Multi-Level Clustering To Prolong The Lifetime of Wireless Sensor Networks. - Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Combining Multiple Feature Extraction Techniques for Handwritten Devnagari Character Recognition. - Alexandr Andoni, Robert Krauthgamer, Krzysztof Onak:
Polylogarithmic Approximation for Edit Distance and the Asymmetric Query Complexity. - Santanu Halder, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Face Synthesis (FASY) System for Generation of a Face Image from Human Description. - Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu:
Classification of Polar-Thermal Eigenfaces using Multilayer Perceptron for Human Face Recognition. - Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mohantapash Kundu:
Reduction of Feature Vectors Using Rough Set Theory for Human Face Recognition. - Chunhua Shen, Peng Wang, Hanxi Li:
LACBoost and FisherBoost: Optimally Building Cascade Classifiers. - Gábor Erdélyi, Lena Piras, Jörg Rothe:
Bucklin Voting is Broadly Resistant to Control. - Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhang:
Incremental Training of a Detector Using Online Sparse Eigen-decomposition. - (Withdrawn) On a new complete invariant of acyclic graphs.
- Shvetha Soundararajan, James D. Arthur:
A Structured Framework for Assessing the "Goodness" of Agile Methods. - Shay Solomon:
An Optimal-Time Construction of Euclidean Sparse Spanners with Tiny Diameter. - Andrew Lin:
The Complexity of Manipulating $k$-Approval Elections. - K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar:
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction. - Yipeng Liu, Qun Wan, Xiaoli Chu:
A Robust Beamformer Based on Weighted Sparse Constraint. - Y. Babykalpana, K. Thanushkodi:
Classification of LULC Change Detection using Remotely Sensed Data for Coimbatore City, Tamilnadu, India. - Xiaohui Bei, Zhiyi Huang:
Towards Optimal Bayesian Algorithmic Mechanism Design. - K. Chitra, G. Padmavathi:
Classification and Performance of AQM-Based Schemes for Congestion Avoidance. - S. B. Thorat, S. K. Nayak, Jyoti P. Dandale:
Facial Recognition Technology: An analysis with scope in India. - Najme Zehra, Mansi Sharma, Somya Ahuja, Shubha Bansal:
Bio-Authentication based Secure Transmission System using Steganography. - C. Srisailam, Mukesh Tiwari, Anurag Trivedi:
Reduction in iron losses in Indirect Vector-Controlled IM Drive using FLC. - Raju Barskar, Anjana Jayant Deen, Jyoti Bharti, Gulfishan Firdose Ahmed:
The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology. - Uday Pratap Singh, Sanjeev Jain, Gulfishan Firdose Ahmed:
Content Base Image Retrieval Using Phong Shading. - R. Murali Prasad, P. Satish Kumar:
An Adaptive Power Efficient Packet Scheduling Algorithm for Wimax Networks. - V. Kavitha, M. Punithavalli:
Clustering Time Series Data Stream - A Literature Survey. - K. Delhi Babu, P. Govinda Rajulu, A. Ramamohana Reddy, A. N. Aruna Kumari:
Selection of Architecture Styles using Analytic Network Process for the Optimization of Software Architecture. - G. Arutchelvan, S. K. Srivatsa, R. Jagannathan:
Inaccuracy Minimization by Partioning Fuzzy Data Sets - Validation of Analystical Methodology. - C. S. Sridhar, R. ShashiKumar, S. Madhava Kumar, Manjula Sridhar, Varun D.:
E-Speed Governors For Public Transport Vehicles.