# Computer Science

## Authors and titles for Aug 2012

[ total of 939 entries: 1-939 ]

[ showing 939 entries per page: fewer | more ]

[1]
Maintenance de l'outil Wr2fdr de traduction de Wright vers CSP
Comments: arXiv admin note: substantial text overlap with arXiv:1207.7121, arXiv:1207.6831 by other authors
Subjects: Software Engineering (cs.SE)
[2]
Network Agile Preference-Based Prefetching for Mobile Devices
Subjects: Networking and Internet Architecture (cs.NI)
[3]
Large-scale continuous subgraph queries on streams
Journal-ref: In Proceedings of the first annual workshop on High performance computing meets databases (HPCDB 2011). ACM, New York, NY, USA, 29-32
Subjects: Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[4]
Capacity Results for Two Classes of Three-Way Channels
Comments: Author's final version (accepted for presentation at IEEE 12th International Symposium on Communications and Information Technologies [ISCIT 2012])
Journal-ref: Proceedings of the 12th International Symposium on Communications & Information Technologies (ISCIT 2012), Gold Coast, Australia, pp. 471-476, 2012
Subjects: Information Theory (cs.IT)
[5]
Confidentiality without Encryption For Cloud Computational Privacy
Comments: 3 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)
[6]
Streaming Codes for Channels with Burst and Isolated Erasures
Subjects: Information Theory (cs.IT); Multimedia (cs.MM)
[7]
A Scalable Algorithm for Maximizing Range Sum in Spatial Databases
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1088-1099 (2012)
Subjects: Databases (cs.DB)
[8]
Spatial Queries with Two kNN Predicates
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1100-1111 (2012)
Subjects: Databases (cs.DB)
[9]
Optimal Algorithms for Crawling a Hidden Database in the Web
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1112-1123 (2012)
Subjects: Databases (cs.DB)
[10]
Diversifying Top-K Results
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1124-1135 (2012)
Subjects: Databases (cs.DB)
[11]
Keyword-aware Optimal Route Search
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1136-1147 (2012)
Subjects: Databases (cs.DB)
[12]
Answering Queries using Views over Probabilistic XML: Complexity and Tractability
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1148-1159 (2012)
Subjects: Databases (cs.DB)
[13]
Probabilistic Databases with MarkoViews
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1160-1171 (2012)
Subjects: Databases (cs.DB)
[14]
The Complexity of Social Coordination
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1172-1183 (2012)
Subjects: Databases (cs.DB)
[15]
Efficient Multi-way Theta-Join Processing Using MapReduce
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1184-1195 (2012)
Subjects: Databases (cs.DB)
[16]
Stubby: A Transformation-based Optimizer for MapReduce Workflows
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1196-1207 (2012)
Subjects: Databases (cs.DB)
[17]
Labeling Workflow Views with Fine-Grained Dependencies
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1208-1219 (2012)
Subjects: Databases (cs.DB)
[18]
Fundamentals of Order Dependencies
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1220-1231 (2012)
Subjects: Databases (cs.DB)
[19]
Optimization of Analytic Window Functions
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1244-1255 (2012)
Subjects: Databases (cs.DB)
[20]
Opening the Black Boxes in Data Flow Optimization
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1256-1267 (2012)
Subjects: Databases (cs.DB)
[21]
Spinning Fast Iterative Data Flows
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1268-1279 (2012)
Subjects: Databases (cs.DB)
[22]
REX: Recursive, Delta-Based Data-Centric Computation
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1280-1291 (2012)
Subjects: Databases (cs.DB)
[23]
K-Reach: Who is in Your Small World
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1292-1303 (2012)
Subjects: Databases (cs.DB)
[24]
Performance Guarantees for Distributed Reachability Queries
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1304-1315 (2012)
Subjects: Databases (cs.DB)
[25]
Efficient Indexing and Querying over Syntactically Annotated Trees
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1316-1327 (2012)
Subjects: Databases (cs.DB)
[26]
PrivBasis: Frequent Itemset Mining with Differential Privacy
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1340-1351 (2012)
Subjects: Databases (cs.DB)
[27]
Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1352-1363 (2012)
Subjects: Databases (cs.DB)
[28]
Search Me If You Can: Privacy-preserving Location Query Service
Comments: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 2013
Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
[29]
Analysis of access in the Take-Grant model
Subjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
[30]
Graph Isomorphism for Graph Classes Characterized by two Forbidden Induced Subgraphs
Comments: 22 pages, 4 figures. To appear in the proceedings of WG 2012
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[31]
Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks
Comments: 9 pages, 7 figures
Subjects: Computer Science and Game Theory (cs.GT); Data Structures and Algorithms (cs.DS)
[32]
Personalization in Geographic information systems: A survey
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 , pp 291-298
Subjects: Information Retrieval (cs.IR); Databases (cs.DB)
[33]
Spatial and Spatio-Temporal Multidimensional Data Modelling: A Survey
Journal-ref: International Journal of Advanced Research in Computer Science and Software (IJARCCE), Volume 1, Issue 1, March 2012
Subjects: Databases (cs.DB)
[34]
Naming and Counting in Anonymous Unknown Dynamic Networks
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[35]
Opportunistic Forwarding with Partial Centrality
Comments: 9 pages and 7 figures
Subjects: Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
[36]
Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-Channels
Comments: 5 pages, 9 figures, submitted to SCC 13
Subjects: Information Theory (cs.IT)
[37]
Adaptation of pedagogical resources description standard (LOM) with the specificity of Arabic language
Comments: 8 pages,10 figures. arXiv admin note: substantial text overlap with arXiv:1206.2009
Subjects: Computation and Language (cs.CL)
[38]
The Complexity of MaxMin Length Triangulation
Comments: 7 pages, 3 figures
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[39]
Towards the Next Generation of Data Warehouse Personalization System: A Survey and a Comparative Study
Journal-ref: IJCSI International Journal of Computer Science Issues, Vol 9, Issue 3, No 2, May 2012, pages 561-568
Subjects: Databases (cs.DB)
[40]
Functional Mechanism: Regression Analysis under Differential Privacy
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1364-1375 (2012)
Subjects: Databases (cs.DB)
[41]
Publishing Microdata with a Robust Privacy Guarantee
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1388-1399 (2012)
Subjects: Databases (cs.DB)
[42]
Measuring Two-Event Structural Correlations on Graphs
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1400-1411 (2012)
Subjects: Databases (cs.DB)
[43]
Ranking Large Temporal Data
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1412-1423 (2012)
Subjects: Databases (cs.DB)
[44]
Compacting Transactional Data in Hybrid OLTP & OLAP Databases
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1424-1435 (2012)
Subjects: Databases (cs.DB)
[45]
Processing a Trillion Cells per Mouse Click
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1436-1446 (2012)
Subjects: Databases (cs.DB)
[46]
OLTP on Hardware Islands
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1447-1458 (2012)
Subjects: Databases (cs.DB)
[47]
Hamming Approximation of NP Witnesses
Journal-ref: Theory of Computing 9(22), 2013, pp. 685-702
Subjects: Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS)
[48]
Electronic administration in Spain: from its beginnings to the present
Journal-ref: Government Information Quarterly, vol 28, 1, January 2011, pp. 74-90
Subjects: Computers and Society (cs.CY); Digital Libraries (cs.DL)
[49]
Serializability, not Serial: Concurrency Control and Availability in Multi-Datacenter Datastores
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1459-1470 (2012)
Subjects: Databases (cs.DB)
[50]
Automatic Partitioning of Database Applications
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1471-1482 (2012)
Subjects: Databases (cs.DB)
[51]
Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1495-1506 (2012)
Subjects: Databases (cs.DB)
[52]
ALAE: Accelerating Local Alignment with Affine Gap Exactly in Biosequence Databases
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1507-1518 (2012)
Subjects: Databases (cs.DB)
[53]
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1519-1530 (2012)
Subjects: Databases (cs.DB)
[54]
SCOUT: Prefetching for Latent Feature Following Queries
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1531-1542 (2012)
Subjects: Databases (cs.DB)
[55]
Accelerating Pathology Image Data Cross-Comparison on CPU-GPU Hybrid Systems
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1543-1554 (2012)
Subjects: Databases (cs.DB)
[56]
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1555-1566 (2012)
Subjects: Databases (cs.DB)
[57]
A Parametric Worst-Case Approach to Fairness in TU-Cooperative Games
Subjects: Computer Science and Game Theory (cs.GT)
[58]
Who Tags What? An Analysis Framework
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1567-1578 (2012)
Subjects: Databases (cs.DB)
[59]
A Generic Framework for Efficient and Effective Subsequence Retrieval
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1579-1590 (2012)
Subjects: Databases (cs.DB)
[60]
Only Aggressive Elephants are Fast Elephants
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1591-1602 (2012)
Subjects: Databases (cs.DB)
[61]
Multiple Location Profiling for Users and Relationships from Social Network and Content
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1603-1614 (2012)
Subjects: Databases (cs.DB)
[62]
Flash-based Extended Cache for Higher Throughput and Faster Recovery
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1615-1626 (2012)
Subjects: Databases (cs.DB)
[63]
Don't Thrash: How to Cache Your Hash on Flash
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1627-1637 (2012)
Subjects: Databases (cs.DB)
[64]
Learning Expressive Linkage Rules using Genetic Programming
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1638-1649 (2012)
Subjects: Databases (cs.DB)
[65]
Mining Frequent Itemsets over Uncertain Databases
Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1650-1661 (2012)
Subjects: Databases (cs.DB)
[66]
The Distributed Ontology Language (DOL): Use Cases, Syntax, and Extensibility
Comments: Terminology and Knowledge Engineering Conference (TKE) 2012-06-20 to 2012-06-21 Madrid, Spain
Subjects: Artificial Intelligence (cs.AI); Digital Libraries (cs.DL); Logic in Computer Science (cs.LO)
[67]
Equilibria of Chinese Auctions
Subjects: Computer Science and Game Theory (cs.GT)
[68]
A Model for Minimizing Active Processor Time
Subjects: Data Structures and Algorithms (cs.DS)
[69]
Artificial Neural Network Based Prediction of Optimal Pseudo-Damping and Meta-Damping in Oscillatory Fractional Order Dynamical Systems
Comments: 7 pages, 9 figures
Journal-ref: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), art. no. 6216029 , pp. 350-356
Subjects: Systems and Control (cs.SY); Neural and Evolutionary Computing (cs.NE)
[70]
Logarithmic Lipschitz norms and diffusion-induced instability
Subjects: Systems and Control (cs.SY); Analysis of PDEs (math.AP)
[71]
Signal Space CoSaMP for Sparse Recovery with Redundant Dictionaries
Subjects: Information Theory (cs.IT)
[72]
An Automat for the Semantic Processing of Structured Information
Comments: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89
Journal-ref: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89
Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
[73]
Fast Planar Correlation Clustering for Image Segmentation
Comments: This is the extended version of a paper to appear at the 12th European Conference on Computer Vision (ECCV 2012)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Data Structures and Algorithms (cs.DS); Learning (cs.LG); Machine Learning (stat.ML)
[74]
An Economic Analysis of User-Privacy Options in Ad-Supported Services
Subjects: Computer Science and Game Theory (cs.GT)
[75]
Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network
Subjects: Networking and Internet Architecture (cs.NI)
[76]
Linear Time Algorithm for Optimal Feed-link Placement
Subjects: Computational Geometry (cs.CG)
[77]
Solving Cyclic Longest Common Subsequence in Quadratic Time
Comments: Updated references; an O(n^2) solution already exists, though it is terribly unwieldy
Subjects: Data Structures and Algorithms (cs.DS)
[78]
Local public good provisioning in networks: A Nash implementation mechanism
Subjects: Computer Science and Game Theory (cs.GT)
[79]
Multidimensional Membership Mixture Models
Comments: 9 pages, 7 figures
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[80]
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
Subjects: Cryptography and Security (cs.CR)
[81]
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions
Subjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
[82]
Fixed Interfaces, Adaptive Interfaces... What is next? Total movability - a new paradigm for the user interface
Comments: 9 pages, 4 figures
Subjects: Human-Computer Interaction (cs.HC)
[83]
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[84]
Grey Power Models Based on Optimization of Initial Condition and Model Parameters
Subjects: Systems and Control (cs.SY); Optimization and Control (math.OC)
[85]
Efficient Point-to-Subspace Query in $\ell^1$ with Application to Robust Object Instance Recognition
Comments: Revised based on reviewers' feedback; one new experiment on synthesized data added; one section discussing the speed up added
Journal-ref: SIAM Journal on Imaging Sciences, 7(4):2105 - 2138, 2014
Subjects: Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG); Machine Learning (stat.ML)
[86]
Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems with Interference
Comments: Accepted to appear in IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)
[87]
Diamond-free Degree Sequences
Comments: 8 pages, 2 figures, 2 algorithms, 2 models, 1 table
Journal-ref: Acta Univ. Sapientiae, Informatica, 4(2): 189-200, 2012
Subjects: Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS)
[88]
Criticality of Large Delay Tolerant Networks via Directed Continuum Percolation in Space-Time
Subjects: Performance (cs.PF); Networking and Internet Architecture (cs.NI)
[89]
On Constructor Rewrite Systems and the Lambda Calculus
Ugo Dal Lago (Università di Bologna - Dipartimento di Scienze dell'Informazione), Simone Martini (Università di Bologna - Dipartimento di Scienze dell'Informazione)
Comments: 27 pages. arXiv admin note: substantial text overlap with arXiv:0904.4120
Subjects: Programming Languages (cs.PL)
[90]
An Upper Bound on the Convergence Time for Distributed Binary Consensus
Comments: 15th International Conference on Information Fusion, July 2012, 7 pages
Subjects: Performance (cs.PF)
[91]
Optimization hardness as transient chaos in an analog approach to constraint satisfaction
Comments: 27 pages, 14 figures
Journal-ref: Nature Physics, vol. 7, p. 966-970, 2011
Subjects: Computational Complexity (cs.CC); Neural and Evolutionary Computing (cs.NE); Dynamical Systems (math.DS); Chaotic Dynamics (nlin.CD); Computational Physics (physics.comp-ph)
[92]
Modular Type-Safety Proofs using Dependant Types
Subjects: Programming Languages (cs.PL)
[93]
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Comments: Post-print of accepted manuscript. 32 pages and 3 figures
Journal-ref: Information Sciences 178(15), pp. 3024-3042, August 2008
Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR)
[94]
A Constructive Algorithm to Prove P=NP
Subjects: Data Structures and Algorithms (cs.DS)
[95]
Fast Monotone Summation over Disjoint Sets
Subjects: Data Structures and Algorithms (cs.DS)
[96]
Learning the Interference Graph of a Wireless Network
Comments: submitted to IEEE Trans. Information Theory
Subjects: Information Theory (cs.IT)
[97]
Detection of Deviations in Mobile Applications Network Behavior
Comments: Length of 10 pages, submitted to Annual Computer Security Applications Conference, ACSAC'2012
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
[98]
Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET
Comments: 14 pages,8 figures, International journal of computer engineering science(IJCES)
Subjects: Networking and Internet Architecture (cs.NI)
[99]
Green Telecom Metrics in Perspective
Comments: Preprint submitted to APCC 2012 conference
Subjects: Networking and Internet Architecture (cs.NI)
[100]
Optimal Degree of Optical Circuit Switching in IP-over-WDM Networks
Comments: Long version of a manuscript originally submitted to ONDM 2012
Subjects: Networking and Internet Architecture (cs.NI)
[101]
Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand Ability
Journal-ref: International Journal of Computer and Organization Trends (IJCOT) 2(1) 33-38 (2012)
Subjects: Human-Computer Interaction (cs.HC)
[102]
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor Network
Journal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 3(4) 4764-4769 (2012)
Subjects: Networking and Internet Architecture (cs.NI)
[103]
Debugging Invariant Issues in Pseudo Embedded Program: an Analytical Approach
Comments: This paper has been withdrawn by the author due to a crucial error in fig 1o
Journal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 2(2) 780-785, 2011,
Subjects: Software Engineering (cs.SE)
[104]
The green grid saga - a green initiative to data centers: a review
Journal-ref: Indian Journal of Computer Science and Engineering (IJCSE) 1(4), 2010, 333-339
Subjects: Systems and Control (cs.SY); Distributed, Parallel, and Cluster Computing (cs.DC)
[105]
Debugging Memory Issues In Embedded Linux: A Case Study
Comments: In proceedings of IEEE TechSym 2011, 14-16 January, 2011, IIT kharagpur, India
Subjects: Software Engineering (cs.SE)
[106]
Enumerating Subgraph Instances Using Map-Reduce
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[107]
MLLS: Minimum Length Link Scheduling Under Physical Interference Model
Comments: 8 pages, 1 figure, 2 tables
Subjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
[108]
Economics of Electric Vehicle Charging: A Game Theoretic Approach
Subjects: Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
[109]
On the Consistency of AUC Pairwise Optimization
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[110]
Embracing divergence: a formalism for when your semiring is simply not complete, with applications in quantum simulation
Comments: 54 pages, 5 figures; submitted to the special issue of Theoretical Computer Science A for the 2012 workshop Weighted Automata: Theory and Applications; v2 simplifies the formalism allowing the presentation to be streamlined, and fixes some problems
Subjects: Formal Languages and Automata Theory (cs.FL)
[111]
Triggercast: Enabling Wireless Collisions Constructive
Comments: 10 pages, 18 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[112]
Things that can be made into themselves
Subjects: Logic in Computer Science (cs.LO); Logic (math.LO)
[113]
Comparative Evaluation of Data Stream Indexing Models
Journal-ref: International Journal of Machine Learning and Computing vol. 2, no. 3, pp. 257-260, 2012
Subjects: Databases (cs.DB)
[114]
Efficient and Secure Key Extraction using CSI without Chasing down Errors
Comments: Submitted to INFOCOM 2013
Subjects: Cryptography and Security (cs.CR)
[115]
Semantic Web Requirements through Web Mining Techniques
Comments: arXiv admin note: text overlap with arXiv:cs/0011033 by other authors
Journal-ref: International Journal of Computer Theory and Engineering vol. 4, no. 4, pp. 616-620, 2012
Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
[116]
Imperfect best-response mechanisms
Comments: In the conference version of this work, we claimed that in a modified version of PageRank games, there exists a subgame which is a potential game and thus our results can be used to obtain a good approximation of the logit dynamics for these games. Unfortunately, this claim was wrong and the logit dynamics for this subgame is in general not easy to analyze
Subjects: Computer Science and Game Theory (cs.GT); Computational Complexity (cs.CC)
[117]
Numerical Computations For Operator Axiom
Comments: 39 pages, 2 figures
Subjects: Numerical Analysis (cs.NA)
[118]
Description of the Chord Protocol using ASMs Formalism
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[119]
On logical hierarchies within FO^2-definable languages
Manfred Kufleitner (Institut f), Pascal Weil (LaBRI, Université de Bordeaux and CNRS)
Comments: arXiv admin note: text overlap with arXiv:0904.2894
Journal-ref: LMCS 8 (3:11) 2012
Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
[120]
Vertex Nim played on graphs
Subjects: Discrete Mathematics (cs.DM); Computer Science and Game Theory (cs.GT); Combinatorics (math.CO)
[121]
Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural View
Comments: ISSN 2231-2803. arXiv admin note: text overlap with arXiv:1009.4977 by other authors
Journal-ref: International Journal of Computer Trends and Technology (IJCTT) 2(2/2) 161-166 (2011)
Subjects: Other Computer Science (cs.OH)
[122]
Web based e-learning in india: the cumulative views of different aspects
Journal-ref: Indian Journal of Computer Science and Engineering 1(4), 2010, 340-352
Subjects: Computers and Society (cs.CY)
[123]
Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models
Comments: HotPost 2011, 6 pages
Subjects: Information Retrieval (cs.IR); Learning (cs.LG); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[124]
A Random Walk Based Model Incorporating Social Information for Recommendations
Comments: 2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6 pages
Subjects: Information Retrieval (cs.IR); Learning (cs.LG)
[125]
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets
Comments: 5 pages, Corrected typos from ISIT 2012 conference version
Subjects: Data Structures and Algorithms (cs.DS)
[126]
A Novel Approach of Color Image Hiding using RGB Color planes and DWT
Comments: 6 pages, 14 figures, Published with International Journal of Computer Applications (IJCA)
Journal-ref: International Journal of Computer Applications 36(5):19-24, December 2011
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[127]
On the control of abelian group codes with information group of prime order
Comments: 12 pages, 2 figures
Subjects: Information Theory (cs.IT); Group Theory (math.GR)
[128]
Efficient Algorithms for Maximum Link Scheduling in Distributed Computing Models with SINR Constraints
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[129]
On the chromatic number of a random hypergraph
Comments: 45 pages, 2 figures, revised version
Subjects: Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[130]
Learning Theory Approach to Minimum Error Entropy Criterion
Journal-ref: JMLR 2013
Subjects: Learning (cs.LG); Machine Learning (stat.ML)
[131]
Implementations of ICT Innovations: A Comparative Analysis in terms of Challenges between Developed and Developing Countries
Journal-ref: International Journal of Information, Business and Management, 4(1), 2012
Subjects: Computers and Society (cs.CY)
[132]
A Framework of Value Exchange and Role Playing in Web 2.0 WebSites
Journal-ref: European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS 2012), 2012
Subjects: Computers and Society (cs.CY)
[133]
Portals and Task Innovation: A Theoretical Framework Founded on Business Intelligence Thinking
Journal-ref: The Eleventh Annual International Conference on Business Intelligenece and Knowledge Economy, 2012
Subjects: Other Computer Science (cs.OH)
[134]
Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference