Search This Blog

Saturday, 9 May 2015

Computer Science authors/titles Aug 2012

Computer Science

Authors and titles for Aug 2012

[ total of 939 entries: 1-939 ]

[ showing 939 entries per page: fewer | more ]

[1]  arXiv:1208.0044 [pdf]
Maintenance de l'outil Wr2fdr de traduction de Wright vers CSP
Comments: arXiv admin note: substantial text overlap with arXiv:1207.7121, arXiv:1207.6831 by other authors
Subjects: Software Engineering (cs.SE)
[2]  arXiv:1208.0054 [pdf, other]
Network Agile Preference-Based Prefetching for Mobile Devices
Subjects: Networking and Internet Architecture (cs.NI)
[3]  arXiv:1208.0055 [pdf, ps, other]
Large-scale continuous subgraph queries on streams
Journal-ref: In Proceedings of the first annual workshop on High performance computing meets databases (HPCDB 2011). ACM, New York, NY, USA, 29-32
Subjects: Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[4]  arXiv:1208.0063 [pdf, other]
Capacity Results for Two Classes of Three-Way Channels
Comments: Author's final version (accepted for presentation at IEEE 12th International Symposium on Communications and Information Technologies [ISCIT 2012])
Journal-ref: Proceedings of the 12th International Symposium on Communications & Information Technologies (ISCIT 2012), Gold Coast, Australia, pp. 471-476, 2012
Subjects: Information Theory (cs.IT)
[5]  arXiv:1208.0070 [pdf]
Confidentiality without Encryption For Cloud Computational Privacy
Comments: 3 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[6]  arXiv:1208.0072 [pdf, other]
Streaming Codes for Channels with Burst and Isolated Erasures
Subjects: Information Theory (cs.IT); Multimedia (cs.MM)
[7]  arXiv:1208.0073 [pdf, other]
A Scalable Algorithm for Maximizing Range Sum in Spatial Databases
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1088-1099 (2012)
Subjects: Databases (cs.DB)
[8]  arXiv:1208.0074 [pdf, other]
Spatial Queries with Two kNN Predicates
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1100-1111 (2012)
Subjects: Databases (cs.DB)
[9]  arXiv:1208.0075 [pdf, other]
Optimal Algorithms for Crawling a Hidden Database in the Web
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1112-1123 (2012)
Subjects: Databases (cs.DB)
[10]  arXiv:1208.0076 [pdf, other]
Diversifying Top-K Results
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1124-1135 (2012)
Subjects: Databases (cs.DB)
[11]  arXiv:1208.0077 [pdf, other]
Keyword-aware Optimal Route Search
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1136-1147 (2012)
Subjects: Databases (cs.DB)
[12]  arXiv:1208.0078 [pdf, other]
Answering Queries using Views over Probabilistic XML: Complexity and Tractability
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1148-1159 (2012)
Subjects: Databases (cs.DB)
[13]  arXiv:1208.0079 [pdf, other]
Probabilistic Databases with MarkoViews
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1160-1171 (2012)
Subjects: Databases (cs.DB)
[14]  arXiv:1208.0080 [pdf, other]
The Complexity of Social Coordination
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1172-1183 (2012)
Subjects: Databases (cs.DB)
[15]  arXiv:1208.0081 [pdf, other]
Efficient Multi-way Theta-Join Processing Using MapReduce
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1184-1195 (2012)
Subjects: Databases (cs.DB)
[16]  arXiv:1208.0082 [pdf, other]
Stubby: A Transformation-based Optimizer for MapReduce Workflows
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1196-1207 (2012)
Subjects: Databases (cs.DB)
[17]  arXiv:1208.0083 [pdf, other]
Labeling Workflow Views with Fine-Grained Dependencies
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1208-1219 (2012)
Subjects: Databases (cs.DB)
[18]  arXiv:1208.0084 [pdf, other]
Fundamentals of Order Dependencies
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1220-1231 (2012)
Subjects: Databases (cs.DB)
[19]  arXiv:1208.0086 [pdf, other]
Optimization of Analytic Window Functions
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1244-1255 (2012)
Subjects: Databases (cs.DB)
[20]  arXiv:1208.0087 [pdf, other]
Opening the Black Boxes in Data Flow Optimization
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1256-1267 (2012)
Subjects: Databases (cs.DB)
[21]  arXiv:1208.0088 [pdf, other]
Spinning Fast Iterative Data Flows
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1268-1279 (2012)
Subjects: Databases (cs.DB)
[22]  arXiv:1208.0089 [pdf, other]
REX: Recursive, Delta-Based Data-Centric Computation
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1280-1291 (2012)
Subjects: Databases (cs.DB)
[23]  arXiv:1208.0090 [pdf, other]
K-Reach: Who is in Your Small World
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1292-1303 (2012)
Subjects: Databases (cs.DB)
[24]  arXiv:1208.0091 [pdf, other]
Performance Guarantees for Distributed Reachability Queries
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1304-1315 (2012)
Subjects: Databases (cs.DB)
[25]  arXiv:1208.0092 [pdf, other]
Efficient Indexing and Querying over Syntactically Annotated Trees
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1316-1327 (2012)
Subjects: Databases (cs.DB)
[26]  arXiv:1208.0093 [pdf, other]
PrivBasis: Frequent Itemset Mining with Differential Privacy
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1340-1351 (2012)
Subjects: Databases (cs.DB)
[27]  arXiv:1208.0094 [pdf, other]
Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1352-1363 (2012)
Subjects: Databases (cs.DB)
[28]  arXiv:1208.0107 [pdf, ps, other]
Search Me If You Can: Privacy-preserving Location Query Service
Comments: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 2013
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[29]  arXiv:1208.0108 [pdf]
Analysis of access in the Take-Grant model
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[30]  arXiv:1208.0142 [pdf, ps, other]
Graph Isomorphism for Graph Classes Characterized by two Forbidden Induced Subgraphs
Comments: 22 pages, 4 figures. To appear in the proceedings of WG 2012
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[31]  arXiv:1208.0144 [pdf, ps, other]
Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks
Comments: 9 pages, 7 figures
Subjects: Computer Science and Game Theory (cs.GT); Data Structures and Algorithms (cs.DS)
[32]  arXiv:1208.0153 [pdf]
Personalization in Geographic information systems: A survey
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 , pp 291-298
Subjects: Information Retrieval (cs.IR); Databases (cs.DB)
[33]  arXiv:1208.0163 [pdf]
Spatial and Spatio-Temporal Multidimensional Data Modelling: A Survey
Journal-ref: International Journal of Advanced Research in Computer Science and Software (IJARCCE), Volume 1, Issue 1, March 2012
Subjects: Databases (cs.DB)
[34]  arXiv:1208.0180 [pdf, ps, other]
Naming and Counting in Anonymous Unknown Dynamic Networks
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[35]  arXiv:1208.0186 [pdf, ps, other]
Opportunistic Forwarding with Partial Centrality
Comments: 9 pages and 7 figures
Subjects: Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[36]  arXiv:1208.0193 [pdf, other]
Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels
Comments: 5 pages, 9 figures, submitted to SCC 13
Subjects: Information Theory (cs.IT)
[37]  arXiv:1208.0200 [pdf]
Adaptation of pedagogical resources description standard (LOM) with the specificity of Arabic language
Comments: 8 pages,10 figures. arXiv admin note: substantial text overlap with arXiv:1206.2009
Subjects: Computation and Language (cs.CL)
[38]  arXiv:1208.0202 [pdf, other]
The Complexity of MaxMin Length Triangulation
Comments: 7 pages, 3 figures
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[39]  arXiv:1208.0203 [pdf]
Towards the Next Generation of Data Warehouse Personalization System: A Survey and a Comparative Study
Comments: 8 pages
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol 9, Issue 3, No 2, May 2012, pages 561-568
Subjects: Databases (cs.DB)
[40]  arXiv:1208.0219 [pdf, other]
Functional Mechanism: Regression Analysis under Differential Privacy
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1364-1375 (2012)
Subjects: Databases (cs.DB)
[41]  arXiv:1208.0220 [pdf, other]
Publishing Microdata with a Robust Privacy Guarantee
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1388-1399 (2012)
Subjects: Databases (cs.DB)
[42]  arXiv:1208.0221 [pdf, other]
Measuring Two-Event Structural Correlations on Graphs
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1400-1411 (2012)
Subjects: Databases (cs.DB)
[43]  arXiv:1208.0222 [pdf, other]
Ranking Large Temporal Data
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1412-1423 (2012)
Subjects: Databases (cs.DB)
[44]  arXiv:1208.0224 [pdf, other]
Compacting Transactional Data in Hybrid OLTP & OLAP Databases
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1424-1435 (2012)
Subjects: Databases (cs.DB)
[45]  arXiv:1208.0225 [pdf, other]
Processing a Trillion Cells per Mouse Click
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1436-1446 (2012)
Subjects: Databases (cs.DB)
[46]  arXiv:1208.0227 [pdf, other]
OLTP on Hardware Islands
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1447-1458 (2012)
Subjects: Databases (cs.DB)
[47]  arXiv:1208.0257 [pdf, other]
Hamming Approximation of NP Witnesses
Journal-ref: Theory of Computing 9(22), 2013, pp. 685-702
Subjects: Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS)
[48]  arXiv:1208.0259 [pdf]
Electronic administration in Spain: from its beginnings to the present
Journal-ref: Government Information Quarterly, vol 28, 1, January 2011, pp. 74-90
Subjects: Computers and Society (cs.CY); Digital Libraries (cs.DL)
[49]  arXiv:1208.0270 [pdf, other]
Serializability, not Serial: Concurrency Control and Availability in Multi-Datacenter Datastores
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1459-1470 (2012)
Subjects: Databases (cs.DB)
[50]  arXiv:1208.0271 [pdf, other]
Automatic Partitioning of Database Applications
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1471-1482 (2012)
Subjects: Databases (cs.DB)
[51]  arXiv:1208.0273 [pdf, other]
Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1495-1506 (2012)
Subjects: Databases (cs.DB)
[52]  arXiv:1208.0274 [pdf, other]
ALAE: Accelerating Local Alignment with Affine Gap Exactly in Biosequence Databases
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1507-1518 (2012)
Subjects: Databases (cs.DB)
[53]  arXiv:1208.0275 [pdf, other]
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1519-1530 (2012)
Subjects: Databases (cs.DB)
[54]  arXiv:1208.0276 [pdf, other]
SCOUT: Prefetching for Latent Feature Following Queries
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1531-1542 (2012)
Subjects: Databases (cs.DB)
[55]  arXiv:1208.0277 [pdf, other]
Accelerating Pathology Image Data Cross-Comparison on CPU-GPU Hybrid Systems
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1543-1554 (2012)
Subjects: Databases (cs.DB)
[56]  arXiv:1208.0278 [pdf, other]
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1555-1566 (2012)
Subjects: Databases (cs.DB)
[57]  arXiv:1208.0283 [pdf, ps, other]
A Parametric Worst-Case Approach to Fairness in TU-Cooperative Games
Subjects: Computer Science and Game Theory (cs.GT)
[58]  arXiv:1208.0285 [pdf, other]
Who Tags What? An Analysis Framework
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1567-1578 (2012)
Subjects: Databases (cs.DB)
[59]  arXiv:1208.0286 [pdf, other]
A Generic Framework for Efficient and Effective Subsequence Retrieval
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1579-1590 (2012)
Subjects: Databases (cs.DB)
[60]  arXiv:1208.0287 [pdf, other]
Only Aggressive Elephants are Fast Elephants
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1591-1602 (2012)
Subjects: Databases (cs.DB)
[61]  arXiv:1208.0288 [pdf, other]
Multiple Location Profiling for Users and Relationships from Social Network and Content
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1603-1614 (2012)
Subjects: Databases (cs.DB)
[62]  arXiv:1208.0289 [pdf, other]
Flash-based Extended Cache for Higher Throughput and Faster Recovery
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1615-1626 (2012)
Subjects: Databases (cs.DB)
[63]  arXiv:1208.0290 [pdf, other]
Don't Thrash: How to Cache Your Hash on Flash
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1627-1637 (2012)
Subjects: Databases (cs.DB)
[64]  arXiv:1208.0291 [pdf, other]
Learning Expressive Linkage Rules using Genetic Programming
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1638-1649 (2012)
Subjects: Databases (cs.DB)
[65]  arXiv:1208.0292 [pdf, other]
Mining Frequent Itemsets over Uncertain Databases
Comments: VLDB2012
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1650-1661 (2012)
Subjects: Databases (cs.DB)
[66]  arXiv:1208.0293 [pdf, other]
The Distributed Ontology Language (DOL): Use Cases, Syntax, and Extensibility
Comments: Terminology and Knowledge Engineering Conference (TKE) 2012-06-20 to 2012-06-21 Madrid, Spain
Subjects: Artificial Intelligence (cs.AI); Digital Libraries (cs.DL); Logic in Computer Science (cs.LO)
[67]  arXiv:1208.0296 [pdf, ps, other]
Equilibria of Chinese Auctions
Subjects: Computer Science and Game Theory (cs.GT)
[68]  arXiv:1208.0312 [pdf, ps, other]
A Model for Minimizing Active Processor Time
Subjects: Data Structures and Algorithms (cs.DS)
[69]  arXiv:1208.0318 [pdf]
Artificial Neural Network Based Prediction of Optimal Pseudo-Damping and Meta-Damping in Oscillatory Fractional Order Dynamical Systems
Comments: 7 pages, 9 figures
Journal-ref: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), art. no. 6216029 , pp. 350-356
Subjects: Systems and Control (cs.SY); Neural and Evolutionary Computing (cs.NE)
[70]  arXiv:1208.0326 [pdf, ps, other]
Logarithmic Lipschitz norms and diffusion-induced instability
Subjects: Systems and Control (cs.SY); Analysis of PDEs (math.AP)
[71]  arXiv:1208.0353 [pdf, other]
Signal Space CoSaMP for Sparse Recovery with Redundant Dictionaries
Subjects: Information Theory (cs.IT)
[72]  arXiv:1208.0359 [pdf]
An Automat for the Semantic Processing of Structured Information
Comments: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89
Journal-ref: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89
Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
[73]  arXiv:1208.0378 [pdf, other]
Fast Planar Correlation Clustering for Image Segmentation
Comments: This is the extended version of a paper to appear at the 12th European Conference on Computer Vision (ECCV 2012)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Data Structures and Algorithms (cs.DS); Learning (cs.LG); Machine Learning (stat.ML)
[74]  arXiv:1208.0383 [pdf, other]
An Economic Analysis of User-Privacy Options in Ad-Supported Services
Subjects: Computer Science and Game Theory (cs.GT)
[75]  arXiv:1208.0384 [pdf, ps, other]
Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network
Subjects: Networking and Internet Architecture (cs.NI)
[76]  arXiv:1208.0395 [pdf, other]
Linear Time Algorithm for Optimal Feed-link Placement
Subjects: Computational Geometry (cs.CG)
[77]  arXiv:1208.0396 [pdf, other]
Solving Cyclic Longest Common Subsequence in Quadratic Time
Comments: Updated references; an O(n^2) solution already exists, though it is terribly unwieldy
Subjects: Data Structures and Algorithms (cs.DS)
[78]  arXiv:1208.0400 [pdf, other]
Local public good provisioning in networks: A Nash implementation mechanism
Subjects: Computer Science and Game Theory (cs.GT)
[79]  arXiv:1208.0402 [pdf, other]
Multidimensional Membership Mixture Models
Comments: 9 pages, 7 figures
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[80]  arXiv:1208.0403 [pdf]
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
Subjects: Cryptography and Security (cs.CR)
[81]  arXiv:1208.0407 [pdf]
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions
Comments: 12pages, 7figures
Subjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
[82]  arXiv:1208.0408 [pdf]
Fixed Interfaces, Adaptive Interfaces... What is next? Total movability - a new paradigm for the user interface
Comments: 9 pages, 4 figures
Subjects: Human-Computer Interaction (cs.HC)
[83]  arXiv:1208.0412 [pdf, other]
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[84]  arXiv:1208.0414 [pdf]
Grey Power Models Based on Optimization of Initial Condition and Model Parameters
Subjects: Systems and Control (cs.SY); Optimization and Control (math.OC)
[85]  arXiv:1208.0432 [pdf, other]
Efficient Point-to-Subspace Query in $\ell^1$ with Application to Robust Object Instance Recognition
Comments: Revised based on reviewers' feedback; one new experiment on synthesized data added; one section discussing the speed up added
Journal-ref: SIAM Journal on Imaging Sciences, 7(4):2105 - 2138, 2014
Subjects: Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG); Machine Learning (stat.ML)
[86]  arXiv:1208.0435 [pdf, ps, other]
Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems with Interference
Comments: Accepted to appear in IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)
[87]  arXiv:1208.0460 [pdf, other]
Diamond-free Degree Sequences
Comments: 8 pages, 2 figures, 2 algorithms, 2 models, 1 table
Journal-ref: Acta Univ. Sapientiae, Informatica, 4(2): 189-200, 2012
Subjects: Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS)
[88]  arXiv:1208.0505 [pdf, other]
Criticality of Large Delay Tolerant Networks via Directed Continuum Percolation in Space-Time
Subjects: Performance (cs.PF); Networking and Internet Architecture (cs.NI)
[89]  arXiv:1208.0515 [pdf, ps, other]
On Constructor Rewrite Systems and the Lambda Calculus
Ugo Dal Lago (Università di Bologna - Dipartimento di Scienze dell'Informazione), Simone Martini (Università di Bologna - Dipartimento di Scienze dell'Informazione)
Comments: 27 pages. arXiv admin note: substantial text overlap with arXiv:0904.4120
Subjects: Programming Languages (cs.PL)
[90]  arXiv:1208.0525 [pdf, other]
An Upper Bound on the Convergence Time for Distributed Binary Consensus
Comments: 15th International Conference on Information Fusion, July 2012, 7 pages
Subjects: Performance (cs.PF)
[91]  arXiv:1208.0526 [pdf, other]
Optimization hardness as transient chaos in an analog approach to constraint satisfaction
Comments: 27 pages, 14 figures
Journal-ref: Nature Physics, vol. 7, p. 966-970, 2011
Subjects: Computational Complexity (cs.CC); Neural and Evolutionary Computing (cs.NE); Dynamical Systems (math.DS); Chaotic Dynamics (nlin.CD); Computational Physics (physics.comp-ph)
[92]  arXiv:1208.0535 [pdf, ps, other]
Modular Type-Safety Proofs using Dependant Types
Comments: 8 pages
Subjects: Programming Languages (cs.PL)
[93]  arXiv:1208.0541 [pdf, ps, other]
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Comments: Post-print of accepted manuscript. 32 pages and 3 figures
Journal-ref: Information Sciences 178(15), pp. 3024-3042, August 2008
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR)
[94]  arXiv:1208.0542 [pdf]
A Constructive Algorithm to Prove P=NP
Comments: 4 pages
Subjects: Data Structures and Algorithms (cs.DS)
[95]  arXiv:1208.0554 [pdf, other]
Fast Monotone Summation over Disjoint Sets
Subjects: Data Structures and Algorithms (cs.DS)
[96]  arXiv:1208.0562 [pdf, ps, other]
Learning the Interference Graph of a Wireless Network
Comments: submitted to IEEE Trans. Information Theory
Subjects: Information Theory (cs.IT)
[97]  arXiv:1208.0564 [pdf]
Detection of Deviations in Mobile Applications Network Behavior
Comments: Length of 10 pages, submitted to Annual Computer Security Applications Conference, ACSAC'2012
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[98]  arXiv:1208.0569 [pdf]
Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET
Comments: 14 pages,8 figures, International journal of computer engineering science(IJCES)
Subjects: Networking and Internet Architecture (cs.NI)
[99]  arXiv:1208.0577 [pdf, ps]
Green Telecom Metrics in Perspective
Comments: Preprint submitted to APCC 2012 conference
Subjects: Networking and Internet Architecture (cs.NI)
[100]  arXiv:1208.0581 [pdf, ps]
Optimal Degree of Optical Circuit Switching in IP-over-WDM Networks
Comments: Long version of a manuscript originally submitted to ONDM 2012
Subjects: Networking and Internet Architecture (cs.NI)
[101]  arXiv:1208.0590 [pdf]
Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand Ability
Comments: ISSN 2249-2593
Journal-ref: International Journal of Computer and Organization Trends (IJCOT) 2(1) 33-38 (2012)
Subjects: Human-Computer Interaction (cs.HC)
[102]  arXiv:1208.0591 [pdf]
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network
Comments: ISSN 0975-9646
Journal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 3(4) 4764-4769 (2012)
Subjects: Networking and Internet Architecture (cs.NI)
[103]  arXiv:1208.0592 [src]
Debugging Invariant Issues in Pseudo Embedded Program: an Analytical Approach
Comments: This paper has been withdrawn by the author due to a crucial error in fig 1o
Journal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 2(2) 780-785, 2011,
Subjects: Software Engineering (cs.SE)
[104]  arXiv:1208.0593 [pdf]
The green grid saga - a green initiative to data centers: a review
Comments: ISSN 0976-5166
Journal-ref: Indian Journal of Computer Science and Engineering (IJCSE) 1(4), 2010, 333-339
Subjects: Systems and Control (cs.SY); Distributed, Parallel, and Cluster Computing (cs.DC)
[105]  arXiv:1208.0594 [pdf, ps, other]
Debugging Memory Issues In Embedded Linux: A Case Study
Comments: In proceedings of IEEE TechSym 2011, 14-16 January, 2011, IIT kharagpur, India
Subjects: Software Engineering (cs.SE)
[106]  arXiv:1208.0615 [pdf, ps, other]
Enumerating Subgraph Instances Using Map-Reduce
Comments: 37 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[107]  arXiv:1208.0627 [pdf, ps, other]
MLLS: Minimum Length Link Scheduling Under Physical Interference Model
Comments: 8 pages, 1 figure, 2 tables
Subjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
[108]  arXiv:1208.0631 [pdf, ps, other]
Economics of Electric Vehicle Charging: A Game Theoretic Approach
Subjects: Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
[109]  arXiv:1208.0645 [pdf, ps, other]
On the Consistency of AUC Pairwise Optimization
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[110]  arXiv:1208.0659 [pdf, other]
Embracing divergence: a formalism for when your semiring is simply not complete, with applications in quantum simulation
Comments: 54 pages, 5 figures; submitted to the special issue of Theoretical Computer Science A for the 2012 workshop Weighted Automata: Theory and Applications; v2 simplifies the formalism allowing the presentation to be streamlined, and fixes some problems
Subjects: Formal Languages and Automata Theory (cs.FL)
[111]  arXiv:1208.0664 [pdf, other]
Triggercast: Enabling Wireless Collisions Constructive
Comments: 10 pages, 18 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[112]  arXiv:1208.0682 [pdf, ps, other]
Things that can be made into themselves
Subjects: Logic in Computer Science (cs.LO); Logic (math.LO)
[113]  arXiv:1208.0684 [pdf]
Comparative Evaluation of Data Stream Indexing Models
Journal-ref: International Journal of Machine Learning and Computing vol. 2, no. 3, pp. 257-260, 2012
Subjects: Databases (cs.DB)
[114]  arXiv:1208.0688 [pdf, other]
Efficient and Secure Key Extraction using CSI without Chasing down Errors
Comments: Submitted to INFOCOM 2013
Subjects: Cryptography and Security (cs.CR)
[115]  arXiv:1208.0690 [pdf]
Semantic Web Requirements through Web Mining Techniques
Comments: arXiv admin note: text overlap with arXiv:cs/0011033 by other authors
Journal-ref: International Journal of Computer Theory and Engineering vol. 4, no. 4, pp. 616-620, 2012
Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
[116]  arXiv:1208.0699 [pdf, ps, other]
Imperfect best-response mechanisms
Comments: In the conference version of this work, we claimed that in a modified version of PageRank games, there exists a subgame which is a potential game and thus our results can be used to obtain a good approximation of the logit dynamics for these games. Unfortunately, this claim was wrong and the logit dynamics for this subgame is in general not easy to analyze
Subjects: Computer Science and Game Theory (cs.GT); Computational Complexity (cs.CC)
[117]  arXiv:1208.0701 [pdf, other]
Numerical Computations For Operator Axiom
Comments: 39 pages, 2 figures
Subjects: Numerical Analysis (cs.NA)
[118]  arXiv:1208.0712 [pdf, ps, other]
Description of the Chord Protocol using ASMs Formalism
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[119]  arXiv:1208.0713 [pdf, ps, other]
On logical hierarchies within FO^2-definable languages
Manfred Kufleitner (Institut f), Pascal Weil (LaBRI, Université de Bordeaux and CNRS)
Comments: arXiv admin note: text overlap with arXiv:0904.2894
Journal-ref: LMCS 8 (3:11) 2012
Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
[120]  arXiv:1208.0722 [pdf, other]
Vertex Nim played on graphs
Subjects: Discrete Mathematics (cs.DM); Computer Science and Game Theory (cs.GT); Combinatorics (math.CO)
[121]  arXiv:1208.0755 [pdf]
Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural View
Comments: ISSN 2231-2803. arXiv admin note: text overlap with arXiv:1009.4977 by other authors
Journal-ref: International Journal of Computer Trends and Technology (IJCTT) 2(2/2) 161-166 (2011)
Subjects: Other Computer Science (cs.OH)
[122]  arXiv:1208.0770 [pdf]
Web based e-learning in india: the cumulative views of different aspects
Comments: ISSN 0976-5166
Journal-ref: Indian Journal of Computer Science and Engineering 1(4), 2010, 340-352
Subjects: Computers and Society (cs.CY)
[123]  arXiv:1208.0782 [pdf, other]
Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models
Comments: HotPost 2011, 6 pages
Subjects: Information Retrieval (cs.IR); Learning (cs.LG); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[124]  arXiv:1208.0787 [pdf, other]
A Random Walk Based Model Incorporating Social Information for Recommendations
Comments: 2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6 pages
Subjects: Information Retrieval (cs.IR); Learning (cs.LG)
[125]  arXiv:1208.0798 [pdf, ps, other]
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets
Comments: 5 pages, Corrected typos from ISIT 2012 conference version
Subjects: Data Structures and Algorithms (cs.DS)
[126]  arXiv:1208.0803 [pdf]
A Novel Approach of Color Image Hiding using RGB Color planes and DWT
Comments: 6 pages, 14 figures, Published with International Journal of Computer Applications (IJCA)
Journal-ref: International Journal of Computer Applications 36(5):19-24, December 2011
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[127]  arXiv:1208.0805 [pdf, ps, other]
On the control of abelian group codes with information group of prime order
Comments: 12 pages, 2 figures
Subjects: Information Theory (cs.IT); Group Theory (math.GR)
[128]  arXiv:1208.0811 [pdf, ps, other]
Efficient Algorithms for Maximum Link Scheduling in Distributed Computing Models with SINR Constraints
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[129]  arXiv:1208.0812 [pdf, other]
On the chromatic number of a random hypergraph
Comments: 45 pages, 2 figures, revised version
Subjects: Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[130]  arXiv:1208.0848 [pdf, ps, other]
Learning Theory Approach to Minimum Error Entropy Criterion
Journal-ref: JMLR 2013
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[131]  arXiv:1208.0887 [pdf]
Implementations of ICT Innovations: A Comparative Analysis in terms of Challenges between Developed and Developing Countries
Journal-ref: International Journal of Information, Business and Management, 4(1), 2012
Subjects: Computers and Society (cs.CY)
[132]  arXiv:1208.0891 [pdf]
A Framework of Value Exchange and Role Playing in Web 2.0 WebSites
Journal-ref: European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS 2012), 2012
Subjects: Computers and Society (cs.CY)
[133]  arXiv:1208.0892 [pdf]
Portals and Task Innovation: A Theoretical Framework Founded on Business Intelligence Thinking
Journal-ref: The Eleventh Annual International Conference on Business Intelligenece and Knowledge Economy, 2012
Subjects: Other Computer Science (cs.OH)
[134]  arXiv:1208.0902 [pdf, ps, other]
Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference
Comments: 14 pages
Subjects: Networking and Internet Architecture (cs.NI)
[135]  arXiv:1208.0944 [pdf]
Establishing Virtual R&D Teams: Obliged Policy
Comments: 6th IMC (International Management Conference). Tehran, Iran 2008
Subjects: Other Computer Science (cs.OH)


Computer Science authors/titles Aug 2012

No comments:

Post a Comment