default search action
CoRR, January 2005
- Michael Treaster:
A Survey of Distributed Intrusion Detection Approaches. - Michael Treaster:
A Survey of Fault-Tolerance and Fault-Recovery Techniques in Parallel Systems. - P. A. Burovsky:
Implementation of Motzkin-Burger algorithm in Maple. - Marko A. Rodriguez:
Advances towards a General-Purpose Societal-Scale Human-Collective Problem-Solving Engine. - Alberto Fernández, Sergio Gómez:
Portfolio selection using neural networks. - A. Prasad Sistla:
Formal Languages and Algorithms for Similarity based Retrieval from Sequence Databases. - Sariel Har-Peled, Alper Üngör:
A Time-Optimal Delaunay Refinement Algorithm in Two Dimensions. - Lluis Masanes, Antonio Acín:
Multipartite Secret Correlations and Bound Information. - Mircea Alexandru Popescu Moscu:
On The Liniar Time Complexity of Finite Languages. - Manoj Kumar:
A Cryptographic Study of Some Digital Signature Schemes. - Sergei V. Fedorenko:
A simple algorithm for decoding Reed-Solomon codes and its relation to the Welch-Berlekamp algorithm. - Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper:
Fedora: An Architecture for Complex Objects and their Relationships. - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). - Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo:
On the Design of Perceptual MPEG-Video Encryption Algorithms. - Milan Bradonjic:
Application of Generating Functions and Partial Differential Equations in Coding Theory. - Heide Gluesing-Luerssen:
On the weight distribution of convolutional codes. - Gérard Maze, Chris Monico, Joachim Rosenthal:
Public Key Cryptography based on Semigroup Actions. - Peter D. Turney, Michael L. Littman, Jeffrey Bigham, Victor Shnayder:
Combining Independent Modules in Lexical Multiple-Choice Problems. - Grigorii Pivovarov, Sergei Trunov:
Clustering SPIRES with EqRank. - Francesco Buccafurri, Gianluca Lax, Domenico Saccà, Luigi Pontieri, Domenico Rosaci:
Enhancing Histograms by Tree-Like Bucket Indices. - Jens Harting, Jonathan Chin, Maddalena Venturoli, Peter V. Coveney:
Large-scale lattice Boltzmann simulations of complex fluids: advances through the advent of computational grids. - Lane A. Hemaspaandra, Harald Hempel, Arfst Nickelsen:
Algebraic Properties for Selector Functions. - Arindam Mitra:
Quantum mechanics can alone provide security in communication. - Martin Ziegler:
Effectively Open Real Functions. - Marc Denecker, Eugenia Ternovska:
A Logic for Non-Monotone Inductive Definitions. - Sourav Chakraborty:
On the Sensitivity of Cyclically-Invariant Boolean Functions. - Evan P. Greenberg, David R. Cheriton:
Enforcing Bulk Mail Classification. - Steven de Rooij, Peter Grünwald:
An Empirical Study of MDL Model Selection with Infinite Parametric Complexity. - Francesco Buccafurri, Filippo Furfaro, Domenico Saccà:
Estimating Range Queries using Aggregate Data with Integrity Constraints: a Probabilistic Approach. - Sergey P. Tsarev:
Generalized Laplace transformations and integration of hyperbolic systems of linear partial differential equations. - Giorgi Japaridze:
From truth to computability II. - Riccardo Pucella:
On Partially Additive Kleene Algebras. - Pierre-Louis Curien:
Playful, streamlike computation. - Pierre-Louis Curien:
Symmetry and interactivity in Programming. - Pierre-Louis Curien:
Introduction to linear logic and ludics, part I. - José Ghislain Quenum, Samir Aknine:
Enabling Agents to Dynamically Select Protocols for Interactions. - Michele Tucci:
Oligopolistic Competition in an Evolutionary Environment: a Computer Simulation. - D. J. Capelis:
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms. - Pierre-Louis Curien:
Introduction to linear logic and ludics, part II. - Luca Aceto, Wan J. Fokkink, Anna Ingólfsdóttir, Bas Luttik:
Split-2 Bisimilarity has a Finite Axiomatization over CCS with Hennessy's Merge. - A. S. Kondratiev, N. P. Polishchuk:
Two Iterative Algorithms for Solving Systems of Simultaneous Linear Algebraic Equations with Real Matrices of Coefficients. - Martin Bernauer:
Maintaining Consistency of Data on the Web. - Wlodzimierz Drabent, Miroslawa Milkowska:
Proving Correctness and Completeness of Normal Programs - a Declarative Approach. - Alexander Haubold, John R. Kender:
Augmented Segmentation and Visualization for Presentation Videos. - Kenneth L. Clarkson, Kasturi R. Varadarajan:
Improved Approximation Algorithms for Geometric Set Cover. - Tommaso Toffoli:
Thermodynamics of used punched tape: A weak and a strong equivalence principle. - Husheng Li, H. Vincent Poor:
Impact of Channel Estimation Errors on Multiuser Detection via the Replica Method. - Husheng Li, H. Vincent Poor:
Low Complexity Joint Iterative Equalization and Multiuser Detection in Dispersive DS-CDMA Channels. - Sinan Gezici, Hisashi Kobayashi, H. Vincent Poor, Andreas F. Molisch:
Performance Evaluation of Impulse Radio UWB Systems with Pulse-Based Polarity Randomization. - Shuguang Cui, Jinjun Xiao, Zhi-Quan Luo, Andrea J. Goldsmith, H. Vincent Poor:
Energy-Efficient Joint Estimation in Sensor Networks: Analog vs. Digital. - Sudharman K. Jayaweera, H. Vincent Poor:
On the Capacity of Multiple Antenna Systems in Rician Fading. - Erhan Bayraktar, H. Vincent Poor:
Stochastic Differential Games in a Non-Markovian Setting. - Vadim Tropashko:
Relational Algebra as non-Distributive Lattice. - Erhan Bayraktar, H. Vincent Poor:
Arbitrage in Fractal Modulated Markets When the Volatility is Stochastic. - Erhan Bayraktar, Li Chen, H. Vincent Poor:
Consistency Problems for Jump-Diffusion Models. - Youngchul Sung, Lang Tong, H. Vincent Poor:
A Large Deviations Approach to Sensor Scheduling for Detection of Correlated Random Fields. - Jun Iichi Fujii, Ritsuo Nakamoto, Kenjiro Yanagi:
Concavity of the auxiliary function appearing in quantum reliability function an classical-quantum channels. - Eran Fishler, H. Vincent Poor:
Estimation of the Number of Sources in Unbalanced Arrays via Information Theoretic Criteria. - Farn Wang:
Under-approximation of the Greatest Fixpoint in Real-Time System Verification. - Farn Wang:
Under-approximation of the Greatest Fixpoints in Real-Time System Verification. - Sinan Gezici, Mung Chiang, H. Vincent Poor, Hisashi Kobayashi:
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems. - Eran Fishler, H. Vincent Poor:
On The Tradeoff Between Two Types of Processing Gain. - Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Poor:
Bandit Problems with Side Observations. - Farhad Meshkati, Mung Chiang, Stuart C. Schwartz, H. Vincent Poor, Narayan B. Mandayam:
A Non-Cooperative Power Control Game for Multi-Carrier CDMA Systems. - Vladimir I. Clue:
Harmonic Analysis. - Mustafa Cenk Gursoy, H. Vincent Poor, Sergio Verdú:
The Noncoherent Rician Fading Channel - Part I : Structure of the Capacity-Achieving Input. - Mustafa Cenk Gursoy, H. Vincent Poor, Sergio Verdú:
The Noncoherent Rician Fading Channel - Part II : Spectral Efficiency in the Low-Power Regime. - Olivier Aycard, Jean-François Mari, Richard Washington:
Learning to automatically detect features for mobile robots using second-order Hidden Markov Models. - Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell, Seif Haridi:
A Statistical Theory of Chord under Churn. - David H. Lorenz, Therapon Skotiniotis:
Extending Design by Contract for Aspect-Oriented Programming. - Cristina Comaniciu, H. Vincent Poor:
Capacity Regions and Optimal Power Allocation for Groupwise Multiuser Detection. - Dominique Dutoit, Thierry Poibeau:
Inferring knowledge from a large semantic network. - Tom Schrijvers, Thom W. Frühwirth:
Optimal Union-Find in Constraint Handling Rules. - Jean-Guillaume Dumas, Clément Pernet, Zhendong Wan:
Efficient Computation of the Characteristic Polynomial. - Marius Zimand:
Simple extractors via constructions of cryptographic pseudo-random generators. - Ketan Mulmuley, Milind A. Sohoni:
Geometric Complexity III: on deciding positivity of Littlewood-Richardson coefficients. - Alexander V. Smirnov, Mikhail Pashkin, Nikolai Chilov, Tatiana Levashova, Andrew Krizhanovsky, Alexey M. Kashevnik:
Ontology-Based Users & Requests Clustering in Customer Service Management System. - Liang Zhou, Miruna Ticrea, Eduard H. Hovy:
Multi-document Biography Summarization. - Zengyou He, Xiaofei Xu, Shengchun Deng:
Data Mining for Actionable Knowledge: A Survey. - Carl Lagoze, Dean B. Krafft, Susan Jesuroga, Tim Cornwell, Ellen J. Cramer, Edwin Shin:
An Information Network Overlay Architecture for the NSDL. - Adriel Kind, Alex J. Grant:
A Tree Search Method for Iterative Decoding of Underdetermined Multiuser Systems. - Peter Jung, Gerhard Wunder:
A Group-Theoretic Approach to the WSSUS Pulse Design Problem. - Jon Phipps, Diane Hillmann, Gordon W. Paynter:
Orchestrating Metadata Enhancement Services: Introducing Lenny. - Thomas Eiter, Axel Polleres:
Towards Automated Integration of Guess and Check Programs in Answer Set Programming: A Meta-Interpreter and Applications. - Oliver Henkel:
Space Frequency Codes from Spherical Codes. - Peter M. Kruse, Andre Naujoks, Dietmar F. Rösner, Manuela Kunze:
Clever Search: A WordNet Based Wrapper for Internet Search Engines. - Manoj Kumar:
Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards. - Alexander Shaydurov:
Information estimations and analysis of structures. - Manuela Kunze, Dietmar F. Rösner:
Issues in Exploiting GermaNet as a Resource in Real Applications. - Chris Winstead, Anthony Rapley, Vincent C. Gaudet, Christian Schlegel:
Stochastic Iterative Decoders. - Maxim Raginsky:
A complexity-regularized quantization approach to nonlinear dimensionality reduction. - Matthew G. Earl, Raffaello D'Andrea:
Multi-Vehicle Cooperative Control Using Mixed Integer Linear Programming. - Manuela Kunze, Dietmar F. Rösner:
Transforming Business Rules Into Natural Language Text. - Manuela Kunze, Dietmar F. Rösner:
Corpus based Enrichment of GermaNet Verb Frames. - Manuela Kunze, Dietmar F. Rösner:
Context Related Derivation of Word Senses. - Dietmar F. Rösner, Manuela Kunze, Sylke Krötzsch:
Transforming and Enriching Documents for the Semantic Web. - Lun Li, David L. Alderson, Reiko Tanaka, John C. Doyle, Walter Willinger:
Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications (Extended Version). - Sakari Seitz, Mikko Alava, Pekka Orponen:
Focused Local Search for Random 3-Satisfiability. - J. Maurice Rojas:
Efficiently Detecting Torsion Points and Subtori. - Shujun Li, Guanrong Chen, Gonzalo Álvarez:
Return-Map Cryptanalysis Revisited. - B. Abbott, P. Baringer, T. Bolton, Zeno Greenwood, E. Gregores, H. Kim, Chokchai Leangsuksun, D. Meyer, N. Mondal, S. Novaes, B. Quinn, Horst Severini, P. Skubic, J. Snow, Mark Sosebee, Jaehoon Yu:
Performance of an Operating High Energy Physics Data Grid: DØSAR-Grid. - Michael Stiber:
Spike timing precision and neural error correction: local behavior. - Cristopher Moore, Alexander Russell, Leonard J. Schulman:
The Symmetric Group Defies Strong Fourier Sampling: Part I. - Pascal Koiran, Vincent Nesme, Natacha Portier:
A quantum lower bound for the query complexity of Simon's problem. - Cristopher Moore, Alexander Russell:
The Symmetric Group Defies Strong Fourier Sampling: Part II. - G. David Forney Jr., Saikat Guha:
Simple Rate-1/3 Convolutional and Tail-Biting Quantum Error-Correcting Codes. - Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli:
Primitive Quantum BCH Codes over Finite Fields. - Juliana Kaizer Vizzotto, Thorsten Altenkirch, Amr Sabry:
Structuring quantum effects: superoperators as arrows. - Kenjiro Yanagi, Shigeru Furuichi, Ken Kuriyama:
A generalized skew information and uncertainty relation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.