


default search action
CoRR, March 2013
- Feng Yan, Philippe Martins, Laurent Decreusefond:

Accuracy of Homology based Coverage Hole Detection for Wireless Sensor Networks on Sphere. - Denis S. Krotov, Vladimir N. Potapov:

Construction of transitive MDS codes. - Lamiaa Fattouh Ibrahim

, Manal El Harby:
Enhancing Clustering Algorithm to Plan Efficient Mobile Network. - Min Chih Lin, Michel J. Mizrahi, Jayme Luiz Szwarcfiter:

An $O^*(1.1939^n)$ time algorithm for minimum weighted dominating induced matching. - Florent R. Madelaine, Barnaby Martin:

QCSP on partially reflexive cycles - the wavy line of tractability. - Zoltán Ésik:

A connection between concurrency and language theory. - Bogdan State, Patrick S. Park, Ingmar Weber, Yelena Mejova, Michael W. Macy:

The Mesh of Civilizations and International Email Flows. - Maziyar Hamdi, Vikram Krishnamurthy, Gang George Yin:

Tracking the Empirical Distribution of a Markov-modulated Duplication-Deletion Random Graph. - Mohammad Shahrokh Esfahani, Masoumeh Nasiri-Kenari:

A Cooperative MARC Scheme Using Analogue Network Coding to Achieve Second-Order Diversity. - Markus Klotzbücher, Geoffrey Biggs, Herman Bruyninckx:

Pure Coordination using the Coordinator--Configurator Pattern. - Shengtian Yang:

Entropy Distance. - Fabio Mogavero

, Aniello Murano
, Moshe Y. Vardi:
Proceedings 1st International Workshop on Strategic Reasoning, SR 2013, Rome, Italy, March 16-17, 2013. EPTCS 112, 2013 [contents] - Michael A. Forbes, Amir Shpilka:

Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing. - Nirmal Shende, Özgür Gürbüz, Elza Erkip:

Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference. - Frank Havemann, Michael Heinz, Jochen Gläser, Alexander Struck

:
Estimating Thematic Similarity of Scholarly Papers with Their Resistance Distance in an Electric Network Model. - Przemyslaw Kazienko, Katarzyna Musial, Tomasz Kajdanowicz:

Multidimensional Social Network in the Social Recommender System. - Tomasz Kajdanowicz, Przemyslaw Kazienko, Piotr Doskocz:

Label-dependent Feature Extraction in Social Networks for Node Classification. - Sanket Kamthe, Smriti Gopinath:

Optimal Threshold Scheduler for Cellular Networks. - Nina Vaits, Edward Moroshko, Koby Crammer:

Second-Order Non-Stationary Online Learning for Regression. - Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg:

Routing for Security in Networks with Adversarial Nodes. - Mojtaba Soltanalian, Petre Stoica:

Designing Unimodular Codes via Quadratic Optimization is not Always Hard. - Gabriel Prat-Masramon, Lluís Belanche:

Exploiting the Accumulated Evidence for Gene Selection in Microarray Gene Expression Data. - Hong-Han Shuai, De-Nian Yang, Philip S. Yu, Chih-Ya Shen, Ming-Syan Chen:

Pattern Based Graph Generator. - Michael Peleg, Shlomo Shamai:

On sparse sensing and sparse sampling of coded signals at sub-Landau rates. - Aysajan Abidin, Jan-Åke Larsson:

Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key. - Phillip Lord:

The Semantic Web takes Wing: Programming Ontologies with Tawny-OWL. - Saravanan Kumarasamy, T. Stephen Thangaraj:

A Pattern Recognition Approach To Secure Cipher Documents. - Srishti Shukla, B. Sundar Rajan:

Wireless Network-Coded Multi-Way Relaying Using Latin Hyper-Cubes. - Liang Feng Zhang:

A Coding-Theoretic Application of Baranyai's Theorem. - Crysttian Arantes Paixão, Flávio Codeço Coelho:

Computable Compressed Matrices. - Wei-Lun Hung, Vijay K. Garg:

AutoSynch: An Automatic-Signal Monitor Based on Predicate Tagging. - Uri Kartoun:

Inverse Signal Classification for Financial Instruments. - Katarzyna Musial, Przemyslaw Kazienko, Tomasz Kajdanowicz:

Social Recommendations within the Multimedia Sharing Systems. - Arvind Yedla, Mostafa El-Khamy, Jungwon Lee, Inyup Kang:

Performance of Spatially-Coupled LDPC Codes and Threshold Saturation over BICM Channels. - Wesam Elshamy, Hassan M. Emara, Ahmed Bahgat:

Clubs-based Particle Swarm Optimization. - Ernst W. Mayer:

Efficient long division via Montgomery multiply. - Xi Li, Guosheng Lin, Chunhua Shen, Anton van den Hengel, Anthony R. Dick:

Learning Hash Functions Using Column Generation. - T. Tony Cai, Wenxin Zhou:

Matrix completion via max-norm constrained optimization. - Thiago C. Silva, Diego R. Amancio:

Network-based stochastic competitive learning approach to disambiguation in collaborative networks. - Hadi Ahmadi, Reihaneh Safavi-Naini:

Secure Distance Bounding Verification using Physical-Channel Properties. - Diego R. Amancio, Osvaldo N. Oliveira Jr., Luciano da F. Costa:

Structure-semantics interplay in complex networks and its effects on the predictability of similarity in texts. - Ramesh Babu, George Abraham, Kiransinh Borasia:

A Review On Securing Distributed Systems Using Symmetric Key Cryptography. - Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:

Audit Games. - Xi Peng, Lei Zhang, Zhang Yi:

Inductive Sparse Subspace Clustering. - Gunjan Kumar, Saswata Shannigrahi:

New Online Algorithm for Dynamic Speed Scaling with Sleep State. - Alexander K. Petrenko, Holger Schlingloff

:
Proceedings Eighth Workshop on Model-Based Testing, MBT 2013, Rome, Italy, 17th March 2013. EPTCS 111, 2013 [contents] - Derrick Wing Kwan Ng, Robert Schober:

Spectral Efficient Optimization in OFDM Systems with Wireless Information and Power Transfer. - Jan A. Bergstra, Cornelis A. Middelburg, Gheorghe Stefanescu:

Network algebra for synchronous dataflow. - Naim Bajçinca:

On computation of the total set of robust discrete-time PID controllers. - Thomas J. Lampoltshammer, Thomas Nowotny, Stefan Plank:

ICT System Design & Implementation Using Wireless Sensors to Support Elderly In-home Assistance. - Waqas Ahmed Imtiaz, Muhammad Afaq, Muhammad Asmatullah Khan Babar:

mSCTP Based Decentralized Mobility Framework. - Ahmad Al Badawi, Qasem Abu Al-Haija:

IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process. - Xiujun Zhang, Yin Sun, Xiang Chen, Shidong Zhou, Jing Wang, Ness B. Shroff:

Distributed Power Allocation for Coordinated Multipoint Transmissions in Distributed Antenna Systems. - Kunal N. Chaudhury:

On the convergence of the IRLS algorithm in Non-Local Patch Regression. - Anwar Pasha Deshmukh, Riyazuddin Qureshi:

Transparent Data Encryption -- Solution for Security of Database Contents. - Ahmet Erdem Sariyüce, Kamer Kaya, Erik Saule, Ümit V. Çatalyürek:

Incremental Algorithms for Network Management and Analysis based on Closeness Centrality. - Naim Bajçinca:

Methods for robust PID control. - Andrew P. Black:

Object-oriented programming: some history, and challenges for the next fifty years. - Kanagavalli V. R., Raja K.:

Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques. - Boyan Bonev, Gema Ramírez-Sánchez, Sergio Ortiz-Rojas:

Statistical sentiment analysis performance in Opinum. - Kanagavalli V. R., Raja K.:

A Study on Application of Spatial Data Mining Techniques for Rural Progress. - Jayaraman J. Thiagarajan, Karthikeyan Natesan Ramamurthy, Andreas Spanias:

Learning Stable Multilevel Dictionaries for Sparse Representation of Images. - Min Wu, Zhengfeng Yang, Wang Lin:

Domain-of-Attraction Estimation for Uncertain Non-polynomial Systems. - Kawser Wazed Nafi, Tonny Shekha Kar, Md. Amjad Hossain, M. M. A. Hashem:

An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory. - N. Priyadharshini, M. S. Vijaya:

Genetic Programming for Document Segmentation and Region Classification Using Discipulus. - Moslema Jahan, M. M. A. Hashem, Gazi Abdullah Shahriar:

Distributed Evolutionary Computation: A New Technique for Solving Large Number of Equations. - Dionysios S. Kalogerias, Nikolaos Chatzipanagiotis, Michael M. Zavlanos, Athina P. Petropulu:

Mobile Jammers for Secrecy Rate Maximization in Cooperative Networks. - Tanay Dey, M. M. A. Hashem, Subroto Kumar Mondal:

On Performance Analysis of AMBR Protocol in Mobile Ad Hoc Networks. - Mahsa Mohseni:

Has your organization compliance with ISMS? A case study in an Iranian Bank. - Shenshi Chen:

Monomial Testing and Applications. - Zhuangming Shen, Jiuai Sun, Hui Zhang, Binjie Qin:

Scale Selection of Adaptive Kernel Regression by Joint Saliency Map for Nonrigid Image Registration. - Djallel Bouneffouf:

Situation-Aware Approach to Improve Context-based Recommender System. - Folke Mitzlaff, Gerd Stumme:

Onomastics 2.0 - The Power of Social Co-Occurrences. - Djallel Bouneffouf:

Optimizing an Utility Function for Exploration / Exploitation Trade-off in Context-Aware Recommender System. - Leena H. Patil, Mohammed Atique:

A Semantic approach for effective document clustering using WordNet. - Kamal Kumar Ghanshala, Durgesh Pant, Jatin Pandey:

A Gaps Approach to Access the Efficiency and Effectiveness of IT-Initiatives In Rural Areas: case study of Samalta, a village in the central Himalayan Region of India. - Xiaogang Liu, Yuan Luo:

The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3. - Péter Sasvári, Zsuzsa Majoros:

Comparison of the Information Technology Development in Slovakia and Hungary. - Hakob Aslanyan, José D. P. Rolim:

Quantitative Characterization of Randomly Roving Agents. - Marco Di Renzo, Alessandro Guidotti, Giovanni Emanuele Corazza:

Average Rate of Downlink Heterogeneous Cellular Networks over Generalized Fading Channels - A Stochastic Geometry Approach. - Ayad Ghany Ismaeel

, Anar Auda Ablahad:
Novel Method for Mutational Disease Prediction using Bioinformatics Techniques and Backpropagation Algorithm. - (Withdrawn) A Joint Localization and Clock Bias Estimation Technique Using Time-of-Arrival at Multiple Antenna Receivers.

- Jun Zhang, Xinran Li, Fang-Wei Fu:

Security Analysis on "An Authentication Code Against Pollution Attacks in Network Coding". - Taher Zaki, Mustapha Amrouch, Driss Mammass, Abdellatif Ennaji:

Arabic documents classification using fuzzy R.B.F. classifier with sliding window. - Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:

Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks. - En-Hui Yang, Jin Meng:

New Non-asymptotic Random Channel Coding Theorems. - Jayaraman J. Thiagarajan, Karthikeyan Natesan Ramamurthy, Andreas Spanias:

Multiple Kernel Sparse Representations for Supervised and Unsupervised Learning. - Yichao Huang, Bhaskar D. Rao:

Random Beamforming with Heterogeneous Users and Selective Feedback: Individual Sum Rate and Individual Scaling Laws. - Dionysios S. Kalogerias, Athina P. Petropulu:

On the Coherence Properties of Random Euclidean Distance Matrices. - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach:

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions. - Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, M. M. A. Hashem:

A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture. - Per Austrin, Petteri Kaski, Mikko Koivisto, Jussi Määttä:

Space--Time Tradeoffs for Subset Sum: An Improved Worst Case Algorithm. - Subra Mukherjee

, Karen Das
:
Omega Model for Human Detection and Counting for application in Smart Surveillance System. - Joyeeta Singha

, Karen Das
:
Indian Sign Language Recognition Using Eigen Value Weighted Euclidean Distance Based Classification Technique. - Jeemoni Kalita, Karen Das

:
Recognition of Facial Expression Using Eigenvector Based Distributed Features and Euclidean Distance Based Decision Making Technique. - A. Meena, K. Raja:

Automatic symmetry based cluster approach for anomalous brain identification in PET scan image : An Analysis. - A. Meena, R. Raja:

Symmetry Based Cluster Approach for Automatic Recognition of the Epileptic Focus in Brain Using PET Scan Image : An Analysis. - Anwitaman Datta

, Stefano Braghin, Jackson Tan Teck Yong:
The Zen of Multidisciplinary Team Recommendation. - A. Meena, R. Raja:

Spatial Fuzzy C Means PET Image Segmentation of Neurodegenerative Disorder. - Xiao-Lei Zhang, Ji Wu:

Denoising Deep Neural Networks Based Voice Activity Detection. - Florent Garcin, Christos Dimitrakakis, Boi Faltings:

Personalized News Recommendation with Context Trees. - Dipasree Pal, Mandar Mitra, Kalyankumar Datta:

Query Expansion Using Term Distribution and Term Association. - Wataru Kumagai, Masahito Hayashi:

Second Order Asymptotics for Random Number Generation. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:

Non-Asymptotic Output Statistics of Random Binning and Its Applications. - Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari:

A Technique for Deriving One-Shot Achievability Results in Network Information Theory. - Gianmarco Romano, Domenico Ciuonzo, Pierluigi Salvo Rossi, Francesco Palmieri:

Low-complexity dominance-based Sphere Decoder for MIMO Systems. - Augusto Ferrante, Nicola Laurenti, Chiara Masiero, Michele Pavon, Stefano Tomasin:

On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels. - Iztok Fister Jr., Tomaz Kosar, Iztok Fister, Marjan Mernik:

EasyTime++: A case study of incremental domain-specific language development. - Namita Sharma, Vineet Sahula, C. P. Ravikumar:

Energy Aware Task Scheduling for Soft Real Time Systems using an Analytical Approach for Energy Estimation. - Amol Deshpande, Lisa Hellerstein, Devorah Kletenik:

Approximation Algorithms for Stochastic Boolean Function Evaluation and Stochastic Submodular Set Cover. - Carola Doerr, G. Ramakrishna, Jens M. Schmidt

:
Computing Minimum Cycle Bases in Weighted Partial 2-Trees in Linear Time. - A. A. Karawia:

New Symbolic Algorithms For Solving A General Bordered Tridiagonal Linear System. - Quentin Barthélemy, Cédric Gouy-Pailler, Yoann Isaac, Antoine Souloumiac, Anthony Larue, Jérôme I. Mars:

Multivariate Temporal Dictionary Learning for EEG. - Robert Hovden:

Bibliometrics for Internet Media: Applying the h-Index to YouTube. - Onur Ozdemir, Ruoyu Li, Pramod K. Varshney:

Hybrid Maximum Likelihood Modulation Classification Using Multiple Radios. - Petr Jancar, Jirí Srba:

Note on Undecidability of Bisimilarity for Second-Order Pushdown Processes. - Kristine Harjes, Pavel Naumov

:
Functional Dependence in Strategic Games (extended abstract). 9-15 - Umberto Grandi, Andrea Loreggia, Francesca Rossi, Kristen Brent Venable, Toby Walsh:

Restricted Manipulation in Iterative Voting: Convergence and Condorcet Efficiency. 17-24 - Nicholas Asher, Soumya Paul:

Infinite games with uncertain moves. 25-32 - Nils Bulling, Valentin Goranko:

How to Be Both Rich and Happy: Combining Quantitative and Qualitative Strategic Reasoning about Multi-Player Games (Extended Abstract). 33-41 - Rayna Dimitrova, Bernd Finkbeiner:

Lossy Channel Games under Incomplete Information. 43-51 - Marta Z. Kwiatkowska, David Parker

, Aistis Simaitis:
Strategic Analysis of Trust Models for User-Centric Networks. 53-59 - Truls Pedersen, Sjur K. Dyrkolbotn, Piotr Kazmierczak, Erik Parmann:

Concurrent Game Structures with Roles. 61-69 - Simon Busard, Charles Pecheur, Hongyang Qu, Franco Raimondi:

Reasoning about Strategies under Partial Observability and Fairness Constraints. 71-79 - Dimitar P. Guelev:

Reducing Validity in Epistemic ATL to Validity in Epistemic CTL. 81-89 - Christophe Chareton, Julien Brunel, David Chemouil

:
Towards an Updatable Strategy Logic. 91-98 - Hélène Kirchner

:
A rewriting point of view on strategies. 99-105 - Benedikt Brütsch:

Synthesizing Structured Reactive Programs via Deterministic Tree Automata. 107-113 - Bastien Maubert, Sophie Pinchinat, Laura Bozzelli:

The Complexity of Synthesizing Uniform Strategies. 115-122 - Anirban Dasgupta, Arpita Ghosh:

Crowdsourced Judgement Elicitation with Endogenous Proficiency. - Milad Sefidgaran, Aslan Tchamkerten:

On Cooperation in Multi-Terminal Computation and Rate Distortion. - Yann Ollivier:

Riemannian metrics for neural networks. - Jessica Sherette, Carola Wenk:

Simple Curve Embedding. - Theodore Book, Adam Pridgen, Dan S. Wallach:

Longitudinal Analysis of Android Ad Library Permissions. - Jeon-Hyung Kang, Kristina Lerman:

Structural and Cognitive Bottlenecks to Information Access in Social Networks. - David W. LeJeune Jr.:

Adaptive Partitioning and its Applicability to a Highly Scalable and Available Geo-Spatial Indexing Solution. - Jierui Xie, Boleslaw K. Szymanski:

LabelRank: A Stabilized Label Propagation Algorithm for Community Detection in Networks. - Lei Wang, Rodrigo C. de Lamare:

Set-Membership Conjugate Gradient Constrained Adaptive Filtering Algorithm for Beamforming. - M. Rajasekhara Babu, Krishnakumar Ventakasubramanian, George Abraham, Kiransinh Borasia:

KRAB Algorithm - A Revised Algorithm for Incremental Call Graph Generation. - R. A. K. Saravanaguru, George Abraham, Krishnakumar Ventakasubramanian, Kiransinh Borasia:

Securing Web Services Using XML Signature and XML Encryption. - Bruno Salcedo:

Implementation without commitment in moral hazard environments. - Lin Wang, Zhi Hu:

Injectivity of Compressing Maps on the Set of Primitive Sequences over $Z/p^e Z$. - Jun Zhang, Xinran Li, Fang-Wei Fu:

An Authentication Scheme for Subspace Codes over Network Based on Linear Codes. - Andrea Tacchetti, Pavan Kumar Mallapragada, Matteo Santoro, Lorenzo Rosasco:

GURLS: a Least Squares Library for Supervised Learning. - Bao-Gang Hu, Hong-Jie Xing:

A New Approach of Deriving Bounds between Entropy and Error from Joint Distribution: Case Study for Binary Classifications. - Jan Egger, Tina Kapur, Andriy Fedorov, Steve Pieper, James V. Miller, Harini Veeraraghavan, Bernd Freisleben, Alexandra J. Golby, Christopher Nimsky, Ron Kikinis:

GBM Volumetry using the 3D Slicer Medical Image Computing Platform. - Wojciech Czerwinski, Wim Martens, Tomás Masopust:

Efficient Separability of Regular Languages by Subsequences and Suffixes. - Zuzana Masáková, Edita Pelantová:

Enumerating Abelian Returns to Prefixes of Sturmian Words. - Victor V. Kashirin, Louis J. Dijkstra:

A heuristic optimization method for mitigating the impact of a virus attack. - Jan Peleska:

Industrial-Strength Model-Based Testing - State of the Art and Current Challenges. 3-28 - Jens Grabowski, Victor V. Kuliamin, Alain-Georges Vouffo Feudjio, Antal Wu-Hen-Chang, Milan Zoric:

Towards the Usage of MBT at ETSI. 30-34 - Isabel Nunes, Filipe Luís:

Testing Java implementations of algebraic specifications. 35-50 - Neda Noroozi, Mohammad Reza Mousavi, Tim A. C. Willemse

:
Decomposability in Input Output Conformance Testing. 51-66 - Mikhail M. Chupilko, Alexander S. Kamkin:

Runtime Verification Based on Executable Models: On-the-Fly Matching of Timed Traces. 67-81 - Stephan Weißleder, Hartmut Lackner:

Top-Down and Bottom-Up Approach for Model-Based Testing of Product Lines. 82-94 - Joshua R. Wang:

Space-Efficient Las Vegas Algorithms for K-SUM. - Srdan Kitic, Laurent Jacques, Nilesh Madhu, Michael Peter Hopwood, Ann Spriet, Christophe De Vleeschouwer:

Consistent Iterative Hard Thresholding For Signal Declipping. - Simon R. Blackburn:

Non-overlapping codes. - Alberto Tarable, Alessandro Nordio, Fabrizio Dabbene, Roberto Tempo:

Anytime Reliable LDPC Convolutional Codes for Networked Control over Wireless Channel. - Sugata Sanyal, Parthasarathy P. Iyer:

Cloud Computing -- An Approach with Modern Cryptography. - I. Ayachi, Ryan Kammarti, Mekki Ksouri, Pierre Borne:

A Genetic algorithm to solve the container storage space allocation problem. - Juan Luis Jerez, Paul J. Goulart, Stefan Richter, George A. Constantinides, Eric C. Kerrigan, Manfred Morari:

Embedded Online Optimization for Model Predictive Control at Megahertz Rates. - Siddharth Jain, Rakesh Kumar Bansal:

On Large Deviation Property of Recurrence Times. - Byungjun Kang, Si-Hyeon Lee, Sae-Young Chung, Changho Suh:

A New Achievable Scheme for Interference Relay Channels. - Siddharth Jain, Rakesh Kumar Bansal:

On Match Lengths and the Asymptotic Behavior of Sliding Window Lempel-Ziv Algorithm for Zero Entropy Sequences. - Adamu Murtala Zungeru, Li-Minn Ang, Kah Phooi Seng:

Termite-hill: From natural to artificial termites in sensor networks. - David Eppstein:

Grid Minors in Damaged Grids. - Chenlu Qiu, Namrata Vaswani:

Recursive Sparse Recovery in Large but Structured Noise - Part 2. - Martin Jaggi:

An Equivalence between the Lasso and Support Vector Machines. - Himal A. Suraweera, Hien Quoc Ngo, Trung Quang Duong, Chau Yuen, Erik G. Larsson:

Multi-Pair Amplify-and-Forward Relaying with Very Large Antenna Arrays. - Badih Ghazi, Haitham Hassanieh, Piotr Indyk, Dina Katabi, Eric Price, Lixin Shi:

Sample-Optimal Average-Case Sparse Fourier Transform in Two Dimensions. - Lei Wang, Rodrigo C. de Lamare:

Reduced-Rank DOA Estimation based on Joint Iterative Subspace Optimization and Grid Search. - Jessica C. Ramírez, Masayuki Asahara, Yuji Matsumoto:

Japanese-Spanish Thesaurus Construction Using English as a Pivot. - Hung-Fu Chang, Stephen C. Y. Lu:

Toward the Integration of Traditional and Agile Approaches. - Md. Amjad Hossain, Md. Kawser Hossain, M. M. A. Hashem:

A Generalized Hybrid Real-Coded Quantum Evolutionary Algorithm Based on Particle Swarm Theory with Arithmetic Crossover. - Maryam Kouzehgar, Mohammad Ali Badamchizadeh, Sohrab Khanmohammadi:

Fuzzy Petri Nets for Human Behavior Verification and Validation. - Radim Belohlávek, Vilém Vychodil:

Discovery of factors in matrices with grades. - Yufeng Li, Ivor W. Tsang, James T. Kwok, Zhi-Hua Zhou:

Convex and Scalable Weakly Labeled SVMs. - Steven Chaplick, Stephen G. Kobourov, Torsten Ueckerdt:

Equilateral L-Contact Graphs. - Rémi Lajugie, Sylvain Arlot, Francis R. Bach:

Large-Margin Metric Learning for Partitioning Problems. - Animesh Kumar:

Bandlimited Signal Reconstruction From the Distribution of Unknown Sampling Locations. - Atreyee Kundu, Debasish Chatterjee:

Stabilizing switching signals for switched linear systems. - Tomoyuki Yamakami:

Constant Unary Constraints and Symmetric Real-Weighted Counting Constraint Satisfaction Problems. - François Baccelli, Chandramani Singh:

Adaptive Spatial Aloha, Fairness and Stochastic Geometry. - Mehmet Deveci, Kamer Kaya, Bora Uçar, Ümit V. Çatalyürek:

GPU accelerated maximum cardinality matching algorithms for bipartite graphs. - Silvia Crafa, Federica Russo:

Causality in concurrent systems. - Pawel Sobocinski, Owen Stephens:

Reachability via Compositionality in Petri nets. - Sugata Sanyal, Parthasarathy P. Iyer:

Inter-Cloud Data Security Strategies. - Merrick McCracken, Maurizio Bocca, Neal Patwari:

Joint Ultra-wideband and Signal Strength-based Through-building Tracking for Tactical Operations. - Jónathan Heras, Ekaterina Komendantskaya:

Statistical Proof Pattern Recognition: Automated or Interactive? - Jónathan Heras, Gadea Mata, Ana Romero, Julio Rubio, Rubén Sáenz:

Verifying a platform for digital imaging: a multi-tool strategy. - Raissa M. D'Souza, Samuel D. Johnson:

Inequality and Network Formation Games. - Kamal Sarkar:

A Hybrid Approach to Extract Keyphrases from Medical Documents. - Marek J. Druzdzel, Herbert A. Simon:

Causality in Bayesian Belief Networks. - Judea Pearl:

From Conditional Oughts to Qualitative Decision Theory. - Russ B. Altman:

A Probabilistic Algorithm for Calculating Structure: Borrowing from Simulated Annealing. - Scott A. Musman, Liwu Chang:

A Study of Scaling Issues in Bayesian Belief Networks for Ship Classification. - Gregory M. Provan:

Tradeoffs in Constructing and Evaluating Temporal Influence Diagrams. - Harold P. Lehmann, Ross D. Shachter:

End-User Construction of Influence Diagrams for Bayesian Statistics. - Steven M. LaValle, Seth Hutchinson:

On Considering Uncertainty and Alternatives in Low-Level Vision. - Paul Dagum, Adam Galper:

Forecasting Sleep Apnea with Dynamic Network Models. - Peter J. Regan:

Normative Engineering Risk Management Systems. - David Heckerman, Michael Shwe:

Diagnosis of Multiple Faults: A Sensitivity Analysis. - Paul Dagum, Adam Galper:

Additive Belief-Network Models. - Francisco Javier Díez:

Parameter Adjustment in Bayes Networks. The generalized noisy OR-gate. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID