default search action
CoRR, March 2005
- Emanuel Diamant:
Top-Down Unsupervised Image Segmentation (it sounds like oxymoron, but actually it is not). - Lester O. Lobo, James D. Arthur:
Local and Global Analysis: Complementary Activities for Increasing the Effectiveness of Requirements Verification and Validation. - Lester O. Lobo, James D. Arthur:
An Objectives-Driven Process for Selecting Methods to Support Requirements Engineering Activities. - Lester O. Lobo, James D. Arthur:
Effective Requirements Generation: Synchronizing Early Verification & Validation, Methods and Method Selection Criteria. - A. Kuyumchyan, A. Isoyan, E. Shulakov, V. Aristov, M. Kondratenkov, A. Snigirev, I. Snigireva, A. Souvorov, K. Tamasaku, M. Yabashi, T. Ishikawa, K. Trouni:
High efficiency and low absorption Fresnel compound zone plates for hard X-ray focusing. - Jing Cai, Cen Tjhai, Martin Tomlinson, Marcel Ambroze, Mohammed Zaki Ahmed:
A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods. - Johan Bollen, Herbert Van de Sompel, Joan A. Smith, Richard Luce:
Toward alternative metrics of journal impact: A comparison of download and citation data. - Laurent Tournier:
Approximation of dynamical systems using S-systems theory : application to biological systems. - Rodrigo S. C. Leão, Valmir Carneiro Barbosa:
Minimal chordal sense of direction and circulant graphs. - Wolfram Krause, Jan Scholz, Martin Greiner:
Optimized network structure and routing metric in wireless multihop ad hoc communication. - Sandeep Pandey, Sourashis Roy, Christopher Olston, Junghoo Cho, Soumen Chakrabarti:
Shuffling a Stacked Deck: The Case for Partially Randomized Ranking of Search Engine Results. - Floris Geerts, Sofie Haesevoets, Bart Kuijpers:
First-order Complete and Computationally Complete Query Languages for Spatio-Temporal Databases. - Luiz Angelo Barchet-Estefanel, Grégory Mounié:
Prédiction de Performances pour les Communications Collectives. - Christian W. Straka:
ADF95: Tool for automatic differentiation of a FORTRAN code designed for large numbers of independent variables. - Arie van Deursen, Marius Marin, Leon Moonen:
A Systematic Aspect-Oriented Refactoring and Testing Strategy, and its Application to JHotDraw. - Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van de Sompel:
File-based storage of Digital Objects and constituent datastreams: XMLtapes and Internet Archive ARC files. - (Withdrawn) A Fast Combined Decimal Adder/Subtractor.
- Joseph Y. Halpern, Riccardo Pucella:
Probabilistic Algorithmic Knowledge. - Amos Lapidoth, Natalia Miliou:
Duality Bounds on the Cut-Off Rate with Applications to Ricean Fading. - Tim Brody, Stevan Harnad:
Earlier Web Usage Statistics as Predictors of Later Citation Impact. - Stevan Harnad:
Fast-Forward on the Green Road to Open Access: The Case Against Mixing Up Green and Gold. - Daniel Pfeifer, Peter C. Lockemann:
Theory and Practice of Transactional Method Caching. - Josiah Carlson, David Eppstein:
The Weighted Maximum-Mean Subtree and Other Bicriterion Subtree Problems. - Dan Tufis, Radu Ion, Nancy Ide:
Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word Alignment, Word Clustering and Aligned Wordnets. - Jia Yu, Rajkumar Buyya:
A Taxonomy of Workflow Management Systems for Grid Computing. - Marcus Hutter:
On Generalized Computable Universal Priors and their Convergence. - Emin Martinian, Gregory W. Wornell, Brian Chen:
Authentication with Distortion Criteria. - Phan Minh Dung, Do Duc Hanh, Phan Minh Thang:
Stabilization of Cooperative Information Agents in Unpredictable Environment: A Logic Programming Approach. - Michael J. Kurtz, Günther Eichhorn, Alberto Accomazzi, Carolyn Stern-Grant, Markus Demleitner, Edwin A. Henneken, Stephen S. Murray:
The Effect of Use and Access on Citations. - Rajesh Mysore Pampapathi, Boris G. Mirkin, Mark Levene:
A Suffix Tree Approach to Email Filtering. - An-Swol Hu, Sergio D. Servetto:
On the Scalability of Cooperative Time Synchronization in Pulse-Connected Networks. - Leopoldo E. Bertossi, Loreto Bravo, Enrico Franconi, Andrei Lopatenko:
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints. - Stergos D. Afantenos, Konstantina Liontou, Maria Salapata, Vangelis Karkaletsis:
An Introduction to the Summarization of Evolving Events: Linear and Non-linear Evolution. - David Poulin, Hugo Touchette:
Comment on "Some non-conventional ideas about algorithmic complexity". - Anna Bogomolnaia, Michel Le Breton, Alexei Savvateev, Shlomo Weber:
The egalitarian sharing rule in provision of public projects. - Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. - Zengyou He:
Mining Top-k Approximate Frequent Patterns. - Armen Grigoryants:
On a Kronecker products sum distance bounds. - Leonid A. Levin:
Notes for Miscellaneous Lectures. - Shalinee Kishore, Stuart C. Schwartz, Larry J. Greenstein, H. Vincent Poor:
Uplink Throughput in a Single-Macrocell/Single-Microcell CDMA System, with Application to Data Access Points. - Shalinee Kishore, Larry J. Greenstein, H. Vincent Poor, Stuart C. Schwartz:
Soft Handoff and Uplink Capacity in a Two-Tier CDMA System. - Shalinee Kishore, Larry J. Greenstein, H. Vincent Poor, Stuart C. Schwartz:
Uplink User Capacity in a CDMA System with Hotspot Microcells: Effects of Finite Transmit Power and Dispersion. - Paolo Liberatore:
Complexity Issues in Finding Succinct Solutions of PSPACE-Complete Problems. - Haixia Jia, Cristopher Moore, Doug Strain:
Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively. - Gregory E. Graham, M. Anzar Afaq, David Evans, Gerald Guglielmo, Eric Wicklund, Peter Love:
Contextual Constraint Modeling in Grid Application Workflows. - Dimitris Achlioptas, Haixia Jia, Cristopher Moore:
Hiding Satisfying Assignments: Two are Better than One. - Christina Peraki, Sergio D. Servetto:
On Multiflows in Random Unit-Disk Graphs, and the Capacity of Some Wireless Networks. - Arindam Mitra:
Is entanglement necessary to have unconditional security in quantum bit commitment ? - Lane A. Hemaspaandra, Jörg Rothe, Amitabh Saxena:
Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory. - Hanna E. Makaruk, Robert Owczarek, Nikita A. Sakhanenko:
Systematic Method for Path-Complete White Box Testing. - Fengfeng Zhou, Guoliang Chen, Yinlong Xu:
Construction of Small Worlds in the Physical Topology of Wireless Networks. - David Doty, Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo, Philippe Moser:
Zeta-Dimension. - Carlos Miravet, Francisco de Borja Rodríguez:
A hybrid MLP-PNN architecture for fast image superresolution. - A. W. Overhauser:
Analytic Definition of Curves and Surfaces by Parabolic Blending. - Gianluca Amato, Francesca Scozzari:
Optimality in Goal-Dependent Analysis of Sharing. - Carlos Miravet, Enrique Coiras, Javier Santamaría:
Semi-automatic vectorization of linear networks on rasterized cartographic maps. - Ion I. Mandoiu, Dragos Trinca:
Exact and Approximation Algorithms for DNA Tag Set Design. - Moshe Schwartz, Alexander Vardy:
On the Stopping Distance and the Stopping Redundancy of Codes. - Laurent Krähenbühl:
Les représentations génétiques d'objets : simples analogies ou modèles pertinents ? Le point de vue de l' "évolutique". - Genetic representations of objects : simple analogies or efficient models ? The "evolutic" point of view. - Quan Son Nguyen:
Multi-Dimensional Hash Chains and Application to Micropayment Schemes. - Sandro Etalle, William H. Winsborough:
Integrity Constraints in Trust Management. - Christoph Koch:
On the Complexity of Nonrecursive XQuery and Functional Query Languages on Complex Values. - Dongning Guo, Sergio Verdú:
Randomly Spread CDMA: Asymptotics via Statistical Physics. - Desmond S. Lun, Niranjan Ratnakar, Muriel Médard, Ralf Koetter, David R. Karger, Tracey Ho, Ebad Ahmed, Fang Zhao:
Minimum-Cost Multicast over Coded Packet Networks. - Dominique Duval, Rachid Echahed, Frédéric Prost:
Data-Structure Rewriting. - Ali Ahmadinia, Christophe Bobda, Ji Ding, Mateusz Majer, Jürgen Teich, Sándor P. Fekete, Jan van der Veen:
A Practical Approach for Circuit Routing on Dynamic Reconfigurable Devices. - Alan Jeffrey, Julian Rathke:
Contextual equivalence for higher-order pi-calculus revisited. - Michael L. Nelson:
A Survey of Reverse Engineering and Program Comprehension. - Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L. Harrison, Nathan McFarland:
mod_oai: An Apache Module for Metadata Harvesting. - Juan P. Neirotti, David Saad:
Improved message passing for inference in densely connected systems. - Joel B. Predd, Sanjeev R. Kulkarni, H. Vincent Poor:
Consistency in Models for Distributed Learning under Communication Constraints. - Joel B. Predd, Sanjeev R. Kulkarni, H. Vincent Poor:
Distributed Learning in Wireless Sensor Networks. - Viktor T. Toth:
Tensor manipulation in GPL Maxima. - Sameer Tilak, Bhanu Pisupati, Kenneth Chiu, Geoffrey Brown, Nael B. Abu-Ghazaleh:
A File System Abstraction for Sense and Respond Systems. - Wai-Yin Ng, W. K. Lin, Dah Ming Chiu:
Statistical Modelling of Information Sharing: Community, Membership and Content. - Marci Meingast, Christopher Geyer, Shankar Sastry:
Geometric Models of Rolling-Shutter Cameras. - Mehryar Mohri, Fernando Pereira, Michael Riley:
Weighted Automata in Text and Speech Processing. - Angelo Luis Pagliosa, Claudio Cesar de Sá, Fernando Deeke Sasse:
Obtaining Membership Functions from a Neuron Fuzzy System extended by Kohonen Network. - A. A. Prikhod'ko, N. A. Prikhod'ko:
Space-time databases modeling global semantic networks. - Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. - Zengyou He, Xiaofei Xu, Shengchun Deng:
An Optimization Model for Outlier Detection in Categorical Data. - Gabriel Istrate, Stefan Boettcher, Allon G. Percus:
Spines of Random Constraint Satisfaction Problems: Definition and Connection with Computational Complexity. - Gabriel Istrate:
Coarse and Sharp Thresholds of Boolean Constraint Satisfaction Problems. - P. Nefyodov, V. Reztsov, O. Riabinina:
The Peculiarities of Nonstationary Formation of Inhomogeneous Structures of Charged Particles in the Electrodiffusion Processes. - Travis Gagie:
Dynamic Shannon Coding. - Joseph Morlier:
Segmentation of the Homogeneity of a Signal Using a Piecewise Linear Recognition Tool. - Reno Filla, Allan Ericsson, Jan-Ove Palmberg:
Dynamic Simulation of Construction Machinery: Towards an Operator Model. - Masahito Hayashi:
General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel. - Masahito Hayashi:
Second order asymptotics in fixed-length source coding and intrinsic randomness. - David K. Arrowsmith, Mario di Bernardo, Francesco Sorrentino:
Effects of variations of load distribution on network performance. - Tatsuaki Okamoto, Ryo Kashima:
Resource Bounded Unprovability of Computational Lower Bounds. - Jan Chomicki, Joyce Song:
Monotonic and Nonmonotonic Preference Revision. - Dimitris Achlioptas, Aaron Clauset, David Kempe, Cristopher Moore:
On the Bias of Traceroute Sampling; or, Power-law Degree Distributions in Regular Graphs. - Boris D. Lubachevsky:
How to Simulate Billiards and Similar Systems. - Paulo Mateus, Amílcar Sernadas:
Weakly complete axiomatization of exogenous quantum propositional logic. - Elchanan Mossel, Ryan O'Donnell, Krzysztof Oleszkiewicz:
Noise stability of functions with low influences: invariance and optimality. - V. V. Kozlov, M. Yu. Mitrofanova:
Galton Board. - Claude Crépeau, Daniel Gottesman, Adam D. Smith:
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. - Saied Hosseini-Khayat, Iman Marvian:
Secure Communication Using Qubits. - Vladimir E. Korepin:
Optimization of Partial Search. - Lars Eirik Danielsen:
On Self-Dual Quantum Codes, Graphs, and Boolean Functions. - A. K. Kwasniewski:
Cobweb posets as noncommutative prefabs. - Ewa Krot:
Characterization of the Fibonacci Cobweb Poset as oDAG. - Ewa Krot:
An Introduction to Finite Fibonomial Calculus. - Alexander Yu. Vlasov:
Programmable Quantum Networks with Pure States. - Subhash C. Kak:
A Three-Stage Quantum Cryptography Protocol.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.