


default search action
CoRR, June 2006
- David Steurer:

Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted Graphs. - Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy:

Mining Behavioral Groups in Large Wireless LANs. - Sergei Kojarski, David H. Lorenz:

Modeling Aspect Mechanisms: A Top-Down Approach. - Victor V. Kryssanov, V. A. Abramov, Hironori Hibino, Yoshiro Fukuda:

A Framework for the Development of Manufacturing Simulators: Towards New Generation of Simulation Systems. - Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda:

The KAA project: a trust policy point of view. - Peter Wittenburg, Daan Broeder, Wolfgang Klein, Stephen C. Levinson, Laurent Romary:

Foundations of Modern Language Resource Archives. - Andrew Pavlo, Christopher Homan, Jonathan Schull:

A parent-centered radial layout algorithm for interactive graph visualization and animation. - Joan A. Smith, Martin Klein, Michael L. Nelson:

Repository Replication Using NNTP and SMTP. - Piotr Faliszewski, Lane A. Hemaspaandra:

The Consequences of Eliminating NP Solutions. - Victor V. Kryssanov, V. A. Abramov, Yoshiro Fukuda, K. Konishi:

A Decision-Making Support System Based on Know-How. - Hao Chen, Liang Ma, Jianhua Li:

Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes. - Maurice Margenstern:

On the communication between cells of a cellular automaton on the penta- and heptagrids of the hyperbolic plane. - Manuel Abellanas, António Leslie Bajuelos, Gregorio Hernández-Peñalver, Ferran Hurtado, Inês Matos, Belén Palop:

Good Illumination of Minimum Range. - Wei Wu, Sriram Vishwanath, Ari Arapostathis:

On the Capacity of Multiple Access Channels with State Information and Feedback. - Rajesh Sundaresan, Arun Padakandla:

The Size of Optimal Sequence Sets for Synchronous CDMA Systems. - Husheng Li, Sharon M. Betz, H. Vincent Poor:

Performance Analysis of Iterative Channel Estimation and Multiuser Detection in Multipath DS-CDMA Channels. - Victor V. Kryssanov, Koh Kakusho:

From semiotics of hypermedia to physics of semiosis: A view from system theory. - Matthias Bauer, Benjamin Fabian, Matthias Fischmann, Seda F. Gürses:

Emerging Markets for RFID Traces. - Roberto M. Amadio:

A synchronous pi-calculus. - Vadim Astakhov, Tamara Astakhova, Brian Sanders:

Imagination as Holographic Processor for Text Animation. - H. Tamaki, Victor V. Kryssanov, S. Kitamura:

A simulation engine to support production scheduling using genetics-based machine learning. - Kaibin Huang, Bishwarup Mondal, Robert W. Heath Jr., Jeffrey G. Andrews:

Limited Feedback for Temporally-Correlated Channels: Feedback Rate and Delay. - Santanu K. Maiti, Sachindra Nath Karmakar:

Parallel Evaluation of Mathematica Programs in Remote Computers. - Edgar H. de Graaf, Jeannette M. de Graaf, Walter A. Kosters:

Consecutive Support: Better Be Close! - Xiaowen Zhang, Li Shu, Ke Tang:

A Chaotic Cipher Mmohocc and Its Security Analysis. - Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen:

Generating parity check equations for bounded-distance iterative erasure decoding. - Victor V. Kryssanov, A. S. Kleshchev, Yoshiro Fukuda, K. Konishi:

Building a logical model in the machining domain for CAPP expert systems. - Evgeniya V. Adutskevich, S. V. Bakhanovich, Nickolai A. Likhoded:

Affine Transformations of Loop Nests for Parallel Execution and Distribution of Data over Processors. - Audun Jøsang:

Belief Calculus. - Véronique Cortier, Heinrich Hördegen, Bogdan Warinschi:

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. - Guillaume Moroz:

Complexity of Resolution of Parametric Systems of Polynomial Equations and Inequations. - Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:

A secure archive for Voice-over-IP conversations. - Cristian S. Calude, Michael Stay:

Natural Halting Probabilities, Partial Randomness, and Zeta Functions. - Teddy Furon:

A constructive and unifying framework for zero-bit watermarking. - Sergei V. Fedorenko, Peter Vladimirovich Trifonov:

Finding roots of polynomials over finite fields. - Maarten H. van Emden, Belaid Moa:

Computational Euclid. - Andrej Bogdanov, Luca Trevisan:

Average-Case Complexity. - Shripad Thite:

Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements. - Victor V. Kryssanov, H. Tamaki, S. Kitamura:

Evolutionary Design: Philosophy, Theory, and Application Tactics. - Bodo Manthey, L. Shankar Ram:

Approximation Algorithms for Multi-Criteria Traveling Salesman Problems. - Ming-Zhe Chen:

Characterization of Pentagons Determined by Two X-rays. - Laurent Hascoët, Mauricio Araya-Polo:

Enabling user-driven Checkpointing strategies in Reverse-mode Automatic Differentiation. - Christian Artigues, Pierre Lopez, Pierre-Dimitri Ayache:

Schedule generation schemes for the job-shop problem with sequence-dependent setup times: dominance properties and computational analysis. - Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg:

Frugality ratios and improved truthful mechanisms for vertex cover. - Nicolai Kuntze, Andreas U. Schmidt:

Trusted Computing in Mobile Action. - Jan Piechalski, Andreas U. Schmidt:

Authorised Translations of Electronic Documents. - Giorgios Kollias, Efstratios Gallopoulos, Daniel B. Szyld:

Asynchronous iterative computations with Web information retrieval structures: The PageRank case. - Rudi Cilibrasi, Paul M. B. Vitányi:

A New Quartet Tree Heuristic for Hierarchical Clustering. - Alexandros G. Dimakis, Vinod M. Prabhakaran, Kannan Ramchandran:

Decentralized Erasure Codes for Distributed Networked Storage. - Prabhu Manyem:

Syntactic Characterisations of Polynomial-Time Optimisation Classes (Syntactic Characterizations of Polynomial-Time Optimization Classes). - Shu-Tao Xia, Fang-Wei Fu:

Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes. - Soummya Kar

, Saeed A. Aldosari, José M. F. Moura:
Topology for Distributed Inference on Graphs. - Arnaud Carayol, Antoine Meyer

:
Context-Sensitive Languages, Rational Graphs and Determinism. - Qiming Lu, György Korniss, Boleslaw K. Szymanski:

Threshold-Controlled Global Cascading in Wireless Sensor Networks. - Jean H. Gallier:

Simple Methods For Drawing Rational Surfaces as Four or Six Bezier Patches. - Jean H. Gallier, Weqing Gu:

Fast and Simple Methods For Computing Control Points. - Fredrik Kuivinen:

Approximability of Bounded Occurrence Max Ones. - Philippe Chapdelaine, Etienne Grandjean:

Lower bounds and complete problems in nondeterministic linear time and sublinear space complexity classes. - Mridul Aanjaneya:

Tromino tilings of Domino-Deficient Rectangles. - Luciano da Fontoura Costa:

Complex Networks: New Concepts and Tools for Real-Time Imaging and Vision. - Jean H. Gallier:

On the Efficiency of Strategies for Subdividing Polynomial Triangular Surface Patches. - Leonid Libkin:

Logics for Unranked Trees: An Overview. - Adam J. Slagell, Kiran Lakkaraju, Katherine Luo:

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. - Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu:

Improved Exponential Time Lower Bound of Knapsack Problem under BT model. - Frank Neven, Thomas Schwentick:

On the complexity of XPath containment in the presence of disjunction, DTDs, and variables. - Audun Jøsang:

The Cumulative Rule for Belief Fusion. - Michael A. Bender, Raphaël Clifford, Kostas Tsichlas:

Scheduling Algorithms for Procrastinators. - Christian Hett, Nicolai Kuntze, Andreas U. Schmidt:

Security and Non-Repudiation for Voice-Over-IP Conversations. - Loïs Rigouste, Olivier Cappé, François Yvon:

Inference and Evaluation of the Multinomial Mixture Model for Text Clustering. - Shane Legg:

Is there an Elegant Universal Theory of Prediction? - Mehdi Ansari Sadrabadi, Alireza Bayesteh, Amir K. Khandani:

Scheduling and Codeword Length Optimization in Time Varying Wireless Networks. - Masahito Hasegawa:

Relational Parametricity and Control. - Muriel Roche, Philippe Réfrégier:

Comparison of the estimation of the degree of polarization from four or two intensity images degraded by speckle noise. - Yingbin Liang, Gerhard Kramer:

Rate Regions for Relay Broadcast Channels. - Lyublena Antova, Christoph Koch, Dan Olteanu:

10^(10^6) Worlds and Beyond: Efficient Representation and Processing of Incomplete Information. - Bin Bin Chen, Pascale Primet:

A Flexible Bandwidth Reservation Framework for Bulk Data Transfers in Grid Networks. - Daniil Ryabko, Marcus Hutter:

On Sequence Prediction for Arbitrary Measures. - David Doty:

Dimension Extractors and Optimal Decompression. - Chawki Hajjem, Stevan Harnad, Yves Gingras:

Ten-Year Cross-Disciplinary Comparison of the Growth of Open Access and How it Increases Research Citation Impact. - Philippe Chapdelaine:

On the structure of linear-time reducibility. - Jürgen Schmidhuber:

New Millennium AI and the Convergence of History. - Jonathan Ben-Naim:

Lack of Finite Characterizations for the Distance-based Revision. - Joakim Jaldén, Björn E. Ottersten:

The Diversity Order of the Semidefinite Relaxation Detector. - Jean H. Gallier:

The Completeness of Propositional Resolution: A Simple and Constructive Proof. - Boris Ryabko, Daniil Ryabko:

Provably Secure Universal Steganographic Systems. - Alain Denise, Marie-Claude Gaudel, Sandrine-Dominique Gouraud, Richard Lassaigne, Sylvain Peyronnet:

Uniform Random Sampling of Traces in Very Large Models. - Bernd Gärtner, Jirí Matousek, Leo Rüst, Petr Skovron:

Violator Spaces: Structure and Algorithms. - Paulo A. Condado, Fernando G. Lobo:

Breaking barriers for people with voice disabilities: Combining virtual keyboards with speech synthesizers, and VoIP applications. - Charis Ermopoulos, William Yurcik:

NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security). - Chris Snow, Lutz H.-J. Lampe, Robert Schober:

Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static Fading Channels. - Christel Baier, Nathalie Bertrand, Philippe Schnoebelen:

On computing fixpoints in well-structured regular model checking, with applications to lossy channel systems. - María-del-Mar Gallardo, Christophe Joubert

, Pedro Merino:
Static Analysis using Parameterised Boolean Equation Systems. - Vladimir Vovk:

Predictions as statements and decisions. - Wim Martens, Frank Neven, Marc Gyssens:

On Typechecking Top-Down XML Tranformations: Fixed Input or Output Schemas. - Jean Krivine:

A verification algorithm for Declarative Concurrent Programming. - Lea Cyrus:

Building a resource for studying translation shifts. - Andrew Krizhanovsky:

Synonym search in Wikipedia: Synarcher. - Jeff M. Phillips, Ran Liu, Carlo Tomasi:

Outlier Robust ICP for Minimizing Fractional RMSD. - Mohammad Ali Maddah-Ali, Amin Mobasher, Amir K. Khandani:

Fairness in Multiuser Systems with Polymatroid Capacity Region. - (Withdrawn) The generating function of the polytope of transport matrices U(r,c) as a positive semidefinite kernel of the marginals r and c.

- Marc Daumas, David R. Lester:

Stochastic Formal Methods: An application to accuracy of numeric software. - (Withdrawn) Toward Functionality Oriented Programming.

- Chengpu Wang:

A New Floating Point Arithmetic with Error Tracking Capability. - Te Sun Han:

An information-spectrum approach to large deviation theorems. - Salah Deeb, Benoît Iung:

Iso9000 Based Advanced Quality Approach for Continuous Improvement of Manufacturing Processes. - Sundeep B, Andrew Thangaraj:

Self-orthogonality of q-ary Images of qm-ary Codes and Quantum Code Construction. - Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas F. Polys, Prince Vincent:

Human Information Processing with the Personal Memex. - Salah Baïna, Hervé Panetto, Khalid Benali:

A Product Oriented Modelling Concept: Holons for systems synchronisation and interoperability. - Manor Mendel, Assaf Naor:

Maximum gradient embeddings and monotone clustering. - Jochen Mundinger, Richard R. Weber, Gideon Weiss:

Optimal Scheduling of Peer-to-Peer File Dissemination. - Hind Bril El Haouzi:

Models simulation and interoperability using MDA and HLA. - Salah Baïna, Gérard Morel:

Product Centric Holons for Synchronisation and Interoperability in Manufacturing Environments. - Marius Marin, Leon Moonen, Arie van Deursen:

A common framework for aspect mining based on crosscutting concern sorts. - Mohammad Rezaeian:

Hidden Markov Process: A New Representation, Entropy Rate and Estimation Entropy. - José Luís Cabral de Moura Borges, Mark Levene:

Evaluating Variable Length Markov Chain Models for Analysis of User Web Navigation Sessions. - Philip Bille:

New Algorithms for Regular Expression Matching. - Fabrice Portier, Rodolphe Legouable, Luc Maret, Franziskus Bauer, N. Neda, Jean-François Hélard, Erwin Hemming, Mathieu Des Noes, Maryline Hélard:

Performance comparison of multi-user detectors for the downlink of a broadband MC-CDMA system. - Sophie Aubin, Adeline Nazarenko, Claire Nedellec:

Adapting a general parser to a sublanguage. - Sampo Pyysalo, Tapio Salakoski, Sophie Aubin, Adeline Nazarenko:

Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a Comparative Evaluation of Three Approaches. - Enrico Formenti, Benoît Masson, Theophilos Pisokas:

On symmetric sandpiles. - Kaibin Huang, Robert W. Heath Jr., Jeffrey G. Andrews:

Joint Beamforming and Scheduling for SDMA Systems with Limited Feedback. - Wolfgang Müller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury:

Comparison of Image Similarity Queries in P2P Systems. - Atos Ramos Alves:

Use MPLS in Lan's. - Sean M. Falconer, Dmitri Maslov:

Weighted hierarchical alignment of directed acyclic graph. - Marius Marin:

Formalizing typical crosscutting concerns. - Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer:

May We Have Your Attention: Analysis of a Selective Attention Task. - Tim Roughgarden, Mukund Sundararajan:

Approximately Efficient Cost-Sharing Mechanisms. - Andrew Krizhanovsky:

Automatic forming lists of semantically related terms based on texts rating in the corpus with hyperlinks and categories (In Russian). - Luca Dall'Asta, Andrea Baronchelli:

Microscopic activity patterns in the Naming Game. - Abolfazl Ramezanpour, Saman Moghimi-Araghi:

Simplifying Random Satisfiability Problem by Removing Frustrating Interactions. - Thierry Mora, Olivier Rivoire:

Statistical mechanics of error exponents for error-correcting codes. - Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala, F. Villani:

Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis. - Marcus Hutter:

Bayesian Regression of Piecewise Constant Functions. - Rami Kanhouche:

Entropy And Vision. - Alexander Barg, Oleg R. Musin:

Codes in spherical caps. - Antoine Moreau, Olivier Teytaud, Jean-Pierre Bertoglio:

Optimal estimation for Large-Eddy Simulation of turbulence and application to the analysis of subgrid models. - Lluis Masanes, Andreas J. Winter:

Unconditional security of key distribution from causality constraints. - François Le Gall:

Exponential Separation of Quantum and Classical Online Space Complexity. - Ilya Mironov, Anton Mityagin, Kobbi Nissim:

Hard Instances of the Constrained Discrete Logarithm Problem. - George I. Bell:

Diagonal Peg Solitaire.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














