default search action
CoRR, April 2006
- Fabrice Rossi, Brieuc Conan-Guez:
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs. - Andrei Lopatenko, Leopoldo E. Bertossi:
Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics. - Petrus H. Potgieter:
Hypercomputing the Mandelbrot Set? - Alexander V. Evako:
The Poincare conjecture for digital spaces. Properties of digital n-dimensional disks and spheres. - Sergio D. Servetto:
Multiterminal Source Coding with Two Encoders--I: A Computable Outer Bound. - David Bateman, Andy Adler:
Sparse Matrix Implementation in Octave. - Laurent Boyer, Victor Poupet, Guillaume Theyssier:
On the Complexity of Limit Sets of Cellular Automata Associated with Probability Measures. - Esther M. Arkin, Hervé Brönnimann, Jeff Erickson, Sándor P. Fekete, Christian Knauer, Jonathan Lenchner, Joseph S. B. Mitchell, Kim Whittlesey:
Minimum-Cost Coverage of Point Sets by Disks. - Alexey V. Melkikh:
Can an Organism Adapt Itself to Unforeseen Circumstances? - Christos Dimitrakakis:
Nearly optimal exploration-exploitation decision thresholds. - Gad Getz, Noam Shental, Eytan Domany:
Semi-Supervised Learning -- A Statistical Physics Approach. - Sreeram Vuppala:
The Aryabhata Algorithm Using Least Absolute Remainders. - Shripad Thite:
On Covering a Graph Optimally with Induced Subgraphs. - O. Habibi, U. R. Patihnedj, M. O. Dhar:
Towards Analog Reverse Time Computation. - Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, George F. Riley, Kimberly C. Claffy:
Revealing the Autonomous System Taxonomy: The Machine Learning Approach. - Michael B. Baer:
On Conditional Branches in Optimal Search Trees. - Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, Kimberly C. Claffy, George F. Riley:
AS Relationships: Inference and Validation. - Madhekar Suneel:
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map. - K. Venkatesh Prasad, Thomas J. Giuli, David Watson:
The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software. - (Withdrawn) Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions.
- Nima Sarshar, Behnam Attaran Rezaei, Vwani P. Roychowdhury:
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution. - Robert Connelly, Erik D. Demaine, Martin L. Demaine, Sándor P. Fekete, Stefan Langerman, Joseph S. B. Mitchell, Ares Ribó, Günter Rote:
Locked and Unlocked Chains of Planar Shapes. - Sameet Sreenivasan, Reuven Cohen, Eduardo López, Zoltán Toroczkai, Harry Eugene Stanley:
Communication Bottlenecks in Scale-Free Networks. - Joel Friedman:
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example. - Tie Liu, Pramod Viswanath:
An Extremal Inequality Motivated by Multiterminal Information Theoretic Problems. - Damiano Bolzoni, Sandro Etalle:
APHRODITE: an Anomaly-based Architecture for False Positive Reduction. - Majid Khayari, Stéphane Schneider, Isabelle Kramer, Laurent Romary:
Unification of multi-lingual scientific terminological resources using the ISO 16642 standard. The TermSciences initiative. - Tie Liu, Pramod Viswanath:
Two Proofs of the Fisher Information Inequality via Data Processing Arguments. - Richard J. Barton, Rong L. Zheng:
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I: Regular Networks. - Richard J. Barton:
The Influence of Adaptive Multicoding on Mutual Information and Channel Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels. - Amos Lapidoth, Ligong Wang:
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels with Memory. - Martin Ziegler, Klaus Meer:
Real Computational Universality: The Word Problem for a class of groups with infinite presentation. - Shuangquan Wang, Ali Abdi:
Statistical Properties of Eigen-Modes and Instantaneous Mutual Information in MIMO Time-Varying Rayleigh Channels. - David Eppstein:
Squarepants in a Tree: Sum of Subtree Clustering and Hyperbolic Pants Decomposition. - R. N. Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang:
Certain new M-matrices and their properties and applications. - Jakob Voss:
Collaborative thesaurus tagging the Wikipedia way. - Erik D. Demaine, Shay Mozes, Benjamin Rossman, Oren Weimann:
An O(n^3)-Time Algorithm for Tree Edit Distance. - Evgueni Petrov, Yuri Kostov, Elena Botoeva:
UniCalc.LIN: a linear constraint solver for the UniCalc system. - David Bateman, Laurent Mazet, Véronique Buzenac-Settineri, Markus Muck:
A Fixed-Point Type for Octave. - Nan Liu, Sennur Ulukus:
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov Random Processes. - R. N. Mohan, Moon Ho Lee, Subash Pokreal:
On Orthogonality of Latin Squares. - Mihai Cristian Florea, Jean Dezert, Pierre Valin, Florentin Smarandache, Anne-Laure Jousselme:
Adaptative combination rule and proportional conflict redistribution rule for information fusion. - Thomas P. Way, Lori L. Pollock:
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures. - R. N. Mohan, Moon Ho Lee, Ram Paudal:
A new M-matrix of Type III, its properties and applications. - Sándor P. Fekete, Jörg Schepers, Jan van der Veen:
An exact algorithm for higher-dimensional orthogonal packing. - Dominique Lepetz, Max Némoz-Gaillard, Michaël Aupetit:
Concerning the differentiability of the energy function in vector quantization algorithms. - Raphaël M. Jungers, Vladimir Protasov, Vincent D. Blondel:
Efficient algorithms for deciding the type of growth of products of integer matrices. - Vita Hinze-Hoare:
Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption. - Vignesh Sethuraman, Bruce E. Hajek:
Low SNR Capacity of Fading Channels with Peak and Average Power Constraints. - R. N. Mohan:
On Hadamard Conjecture. - Michael Brinkmeier:
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time. - M. Tentyukov, J. A. M. Vermaseren:
Extension of the functionality of the symbolic program FORM by external software. - Maciej Kurant, Patrick Thiran:
Survivable Routing in IP-over-WDM Networks in the Presence of Multiple Failures. - Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan Schulz:
New results on rewrite-based satisfiability procedures. - Roman Vershynin:
Beyond Hirsch Conjecture: walks on random polytopes and smoothed complexity of the simplex method. - Woonchul Ham, Kemin Zhou:
A Short Note on The Volume of Hypersphere. - R. N. Mohan, P. T. Kulkarni:
A New Fault-Tolerant M-network and its Analysis. - Yury Lifshits:
Solving Classical String Problems on Compressed Texts. - Olivier Devillers, Philippe Guigue:
Inner and Outer Rounding of Boolean Operations on Lattice Polygonal Regions. - Evelyne Hubert, Alexandre Sedoglavic:
Polynomial Time Nondimensionalisation of Ordinary Differential Equations via their Lie Point Symmetries. - Edwin A. Henneken, Michael J. Kurtz, Günther Eichhorn, Alberto Accomazzi, Carolyn Stern-Grant, Donna M. Thompson, Stephen S. Murray:
Effect of E-printing on Citation Rates in Astronomy and Physics. - Liang Wu:
Biologically Inspired Hierarchical Model for Feature Extraction and Localization. - Yi Hong, Emanuele Viterbo, Jean-Claude Belfiore:
Golden Space-Time Trellis Coded Modulation. - Mirco Mannucci:
Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation. - Binh-Minh Bui-Xuan, Michel Habib, Vincent Limouzy, Fabien de Montgolfier:
Unifying two Graph Decompositions with Modular Decomposition. - Elias P. Tsigaridas, Ioannis Z. Emiris:
Univariate polynomial real root isolation: Continued Fractions revisited. - R. N. Mohan, Moon Ho Lee, Subhash Pokrel:
Certain t-partite graphs. - Benjamin Doerr, Tobias Friedrich, Christian Klein, Ralf Osbild:
Unbiased Matrix Rounding. - Neri Merhav, Meir Feder:
Universal decoding with an erasure option. - Yongzhi Cao, Mingsheng Ying, Guoqing Chen:
Retraction and Generalized Extension of Computing with Words. - Nuno Santos, Birger Koblitz:
Distributed Metadata with the AMGA Metadata Catalog. - Francis Heylighen, Paul Cilliers, Carlos Gershenson:
Complexity and Philosophy. - Muthiah Annamalai, Hemant Kumar, R. Leela Velusamy:
Octave-GTK: A GTK binding for GNU Octave. - (Withdrawn) Complexity Constrained Noise-Free CDMA: Optimal Power Distribution and Spectral Efficiency.
- Qiming Lu, György Korniss, Boleslaw K. Szymanski:
Naming Games in Spatially-Embedded Random Networks. - Loreto Bravo, Leopoldo E. Bertossi:
Semantically Correct Query Answers in the Presence of Null Values. - Jun Chen, Toby Berger:
Successive Wyner-Ziv Coding Scheme and its Application to the Quadratic Gaussian CEO Problem. - Maria Chli, Philippe De Wilde:
The emergence of knowledge exchange: an agent-based model of a software market. - Alexander D. Scott, Gregory B. Sorkin:
Polynomial Constraint Satisfaction: A Framework for Counting and Sampling CSPs and Other Problems. - Alexander D. Scott, Gregory B. Sorkin:
Linear-programming design and analysis of fast algorithms for Max 2-Sat and Max 2-CSP. - Dominique Méry, Stephan Merz:
Event Systems and Access Control. - Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz, Radu V. Balan:
Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach. - Ori Shental, Ido Kanter:
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly Spread CDMA. - Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng:
A Recursive Method for Determining the One-Dimensional Submodules of Laurent-Ore Modules. - Gayathre Krishnan:
Information in Quantum Description and Gate Implementation. - Thomas Eiter, Michael Fink, Hans Tompits:
A Knowledge-Based Approach for Selecting Information Sources. - Yongzhi Cao, Lirong Xia, Mingsheng Ying:
Probabilistic Automata for Computing with Words. - Santanu K. Maiti:
How to Run Mathematica Batch-files in Background ? - Michele Tucci:
Evolutionary Socioeconomics: a Schumpeterian Computer Simulation. - Mirco Mannucci, Lisa Sparks, Daniele C. Struppa:
Simplicial models of social aggregation I. - Jun Chen, Toby Berger:
Robust Distributed Source Coding. - Sinan Gezici, Mung Chiang, H. Vincent Poor, Hisashi Kobayashi:
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio UWB Systems. - Frédérique E. Oggier, Ghaya Rekaya-Ben Othman, Jean-Claude Belfiore, Emanuele Viterbo:
Perfect Space Time Block Codes. - Luciano da Fontoura Costa, Erik M. Bollt:
A Fast and Accurate Nonlinear Spectral Method for Image Recognition and Registration. - Gregory Z. Gutin, Stefan Szeider, Anders Yeo:
Fixed-Parameter Complexity of Minimum Profile Problems. - Tracey Ho:
Polynomial-time algorithms for coding across multiple unicasts. - Sudipto Guha, Boulos Harb:
Approximation algorithms for wavelet transform coding of data streams. - Lawrence Ong, Mehul Motani:
Achievable Rates for the Multiple Access Channel with Feedback and Correlated Sources. - Lawrence Ong, Mehul Motani:
Myopic Coding in Wireless Networks. - Abhishek Parakh:
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange. - Alin Bostan, Frédéric Chyzak, François Ollivier, Bruno Salvy, Éric Schost, Alexandre Sedoglavic:
Fast computation of power series solutions of systems of differential equations. - Vita Hinze-Hoare:
HCI and Educational Metrics as Tools for VLE Evaluation. - Vita Hinze-Hoare:
Further Evaluationh of VLEs using HCI and Educational Metrics. - Akiko Manada, Navin Kashyap:
On the Shannon Covers of Certain Irreducible Constrained Systems of Finite Type. - Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude Chaudet, Timur Friedman, David Simplot-Ryl:
Jumps: Enhancing hop-count positioning in sensor networks using multiple coordinates. - Ofer Shayevitz, Ram Zamir, Meir Feder:
Bounded expected delay in arithmetic coding. - Aleksandar Jovicic, Pramod Viswanath:
Cognitive Radio: An Information-Theoretic Perspective. - Francesc Rosselló, Gabriel Valiente:
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees. - Klaus Rabbertz, Michael Thomas, Shaun Ashby, Marco Corvo, Stefano Argirò, Nikolay Darmenov, Ramzy Darwish, David Evans, Burt Holzman, Natalie Ratnikova, Shahzad Muzaffar, Andreas Nowack, Tony Wildish, Bockjoo Kim, Joanna Weng, Volker Büge:
CMS Software Distribution on the LCG and OSG Grids. - Aram Galstyan, Tad Hogg, Kristina Lerman:
Modeling and Mathematical Analysis of Swarms of Microscopic Robots. - Kristina Lerman, Chris V. Jones, Aram Galstyan, Maja J. Mataric:
Analysis of Dynamic Task Allocation in Multi-Robot Systems. - Jacek Becla, Andrew Hanushevsky, Sergei Nikolaev, Ghaleb Abdulla, Alexander S. Szalay, María A. Nieto-Santisteban, Ani Thakar, Jim Gray:
Designing a Multi-petabyte Database for LSST. - Sergio Caracciolo, Davide Fichera, Andrea Sportiello:
One-in-Two-Matching Problem is NP-complete. - Jonathan Paul Lewis Hatchett, Yoshiyuki Kabashima:
Survey propagation for the cascading Sourlas code. - Einat Klein, Noam Gross, Evi Kopelowitz, Michael Rosenbluh, Lev Khaykovich, Wolfgang Kinzel, Ido Kanter:
Public-channel cryptography based on mutual chaos pass filters. - Hong-Gwa Yeh:
A Dynamic View of Circular Colorings. - Philippe Rigollet:
Generalization error bounds in semi-supervised classification under the cluster assumption. - Ali Akhavi, Jean-François Marckert, Alain Rouault:
On the reduction of a random basis. - Mark Braverman, Michael Yampolsky:
Constructing Non-Computable Julia Sets. - Michael J. Gagen, Kae Nemoto:
Variational optimization of probability measure spaces resolves the chain store paradox. - Francesc Rosselló, Gabriel Valiente:
The transposition distance for phylogenetic trees. - Garry Bowen, Nilanjana Datta:
Beyond i.i.d. in Quantum Information Theory. - Dmitry Gavinsky:
On the Role of Shared Entanglement. - Scott Aaronson, Greg Kuperberg:
Quantum Versus Classical Proofs and Advice. - Andreas Klappenecker, Pradeep Kiran Sarvepalli:
Clifford Code Constructions of Operator Quantum Error Correcting Codes. - Christian Borgs, Jennifer T. Chayes, Elchanan Mossel, Sebastien Roch:
The Kesten-Stigum Reconstruction Bound Is Tight for Roughly Symmetric Binary Channels. - Shankar Bhamidi, Ram Rajagopal, Sébastien Roch:
Network Delay Inference from Additive Metrics. - Benjamin A. Burton:
Enumeration of non-orientable 3-manifolds using face pairing graphs and union-find.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.