Computer Science
Authors and titles for Aug 2012
[ total of 939 entries: 1-939 ][ showing 939 entries per page: fewer | more ]
- [1] arXiv:1208.0044 [pdf]
-
Maintenance de l'outil Wr2fdr de traduction de Wright vers CSPComments: arXiv admin note: substantial text overlap with arXiv:1207.7121, arXiv:1207.6831 by other authorsSubjects: Software Engineering (cs.SE)
- [2] arXiv:1208.0054 [pdf, other]
-
Network Agile Preference-Based Prefetching for Mobile DevicesSubjects: Networking and Internet Architecture (cs.NI)
- [3] arXiv:1208.0055 [pdf, ps, other]
-
Large-scale continuous subgraph queries on streamsJournal-ref: In Proceedings of the first annual workshop on High performance computing meets databases (HPCDB 2011). ACM, New York, NY, USA, 29-32Subjects: Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
- [4] arXiv:1208.0063 [pdf, other]
-
Capacity Results for Two Classes of Three-Way ChannelsComments: Author's final version (accepted for presentation at IEEE 12th International Symposium on Communications and Information Technologies [ISCIT 2012])Journal-ref: Proceedings of the 12th International Symposium on Communications & Information Technologies (ISCIT 2012), Gold Coast, Australia, pp. 471-476, 2012Subjects: Information Theory (cs.IT)
- [5] arXiv:1208.0070 [pdf]
-
Confidentiality without Encryption For Cloud Computational PrivacyComments: 3 pages, 2 figuresSubjects: Cryptography and Security (cs.CR)
- [6] arXiv:1208.0072 [pdf, other]
-
Streaming Codes for Channels with Burst and Isolated ErasuresSubjects: Information Theory (cs.IT); Multimedia (cs.MM)
- [7] arXiv:1208.0073 [pdf, other]
-
A Scalable Algorithm for Maximizing Range Sum in Spatial DatabasesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1088-1099 (2012)Subjects: Databases (cs.DB)
- [8] arXiv:1208.0074 [pdf, other]
-
Spatial Queries with Two kNN PredicatesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1100-1111 (2012)Subjects: Databases (cs.DB)
- [9] arXiv:1208.0075 [pdf, other]
-
Optimal Algorithms for Crawling a Hidden Database in the WebComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1112-1123 (2012)Subjects: Databases (cs.DB)
- [10] arXiv:1208.0076 [pdf, other]
-
Diversifying Top-K ResultsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1124-1135 (2012)Subjects: Databases (cs.DB)
- [11] arXiv:1208.0077 [pdf, other]
-
Keyword-aware Optimal Route SearchComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1136-1147 (2012)Subjects: Databases (cs.DB)
- [12] arXiv:1208.0078 [pdf, other]
-
Answering Queries using Views over Probabilistic XML: Complexity and TractabilityComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1148-1159 (2012)Subjects: Databases (cs.DB)
- [13] arXiv:1208.0079 [pdf, other]
- [14] arXiv:1208.0080 [pdf, other]
-
The Complexity of Social CoordinationComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1172-1183 (2012)Subjects: Databases (cs.DB)
- [15] arXiv:1208.0081 [pdf, other]
-
Efficient Multi-way Theta-Join Processing Using MapReduceComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1184-1195 (2012)Subjects: Databases (cs.DB)
- [16] arXiv:1208.0082 [pdf, other]
-
Stubby: A Transformation-based Optimizer for MapReduce WorkflowsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1196-1207 (2012)Subjects: Databases (cs.DB)
- [17] arXiv:1208.0083 [pdf, other]
-
Labeling Workflow Views with Fine-Grained DependenciesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1208-1219 (2012)Subjects: Databases (cs.DB)
- [18] arXiv:1208.0084 [pdf, other]
-
Fundamentals of Order DependenciesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1220-1231 (2012)Subjects: Databases (cs.DB)
- [19] arXiv:1208.0086 [pdf, other]
-
Optimization of Analytic Window FunctionsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1244-1255 (2012)Subjects: Databases (cs.DB)
- [20] arXiv:1208.0087 [pdf, other]
-
Opening the Black Boxes in Data Flow OptimizationFabian Hueske, Mathias Peters, Matthias Sax, Astrid Rheinländer, Rico Bergmann, Aljoscha Krettek, Kostas TzoumasComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1256-1267 (2012)Subjects: Databases (cs.DB)
- [21] arXiv:1208.0088 [pdf, other]
-
Spinning Fast Iterative Data FlowsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1268-1279 (2012)Subjects: Databases (cs.DB)
- [22] arXiv:1208.0089 [pdf, other]
-
REX: Recursive, Delta-Based Data-Centric ComputationComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1280-1291 (2012)Subjects: Databases (cs.DB)
- [23] arXiv:1208.0090 [pdf, other]
-
K-Reach: Who is in Your Small WorldComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1292-1303 (2012)Subjects: Databases (cs.DB)
- [24] arXiv:1208.0091 [pdf, other]
-
Performance Guarantees for Distributed Reachability QueriesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1304-1315 (2012)Subjects: Databases (cs.DB)
- [25] arXiv:1208.0092 [pdf, other]
-
Efficient Indexing and Querying over Syntactically Annotated TreesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1316-1327 (2012)Subjects: Databases (cs.DB)
- [26] arXiv:1208.0093 [pdf, other]
-
PrivBasis: Frequent Itemset Mining with Differential PrivacyComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1340-1351 (2012)Subjects: Databases (cs.DB)
- [27] arXiv:1208.0094 [pdf, other]
-
Low-Rank Mechanism: Optimizing Batch Queries under Differential PrivacyComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1352-1363 (2012)Subjects: Databases (cs.DB)
- [28] arXiv:1208.0107 [pdf, ps, other]
-
Search Me If You Can: Privacy-preserving Location Query ServiceComments: 9 pages, 1 figure, 2 tables, IEEE INFOCOM 2013Subjects: Cryptography and Security (cs.CR); Social and Information Networks (cs.SI)
- [29] arXiv:1208.0108 [pdf]
-
Analysis of access in the Take-Grant modelSubjects: Cryptography and Security (cs.CR); Data Structures and Algorithms (cs.DS)
- [30] arXiv:1208.0142 [pdf, ps, other]
-
Graph Isomorphism for Graph Classes Characterized by two Forbidden Induced SubgraphsComments: 22 pages, 4 figures. To appear in the proceedings of WG 2012Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
- [31] arXiv:1208.0144 [pdf, ps, other]
-
Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless NetworksComments: 9 pages, 7 figuresSubjects: Computer Science and Game Theory (cs.GT); Data Structures and Algorithms (cs.DS)
- [32] arXiv:1208.0153 [pdf]
-
Personalization in Geographic information systems: A surveyJournal-ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 , pp 291-298Subjects: Information Retrieval (cs.IR); Databases (cs.DB)
- [33] arXiv:1208.0163 [pdf]
-
Spatial and Spatio-Temporal Multidimensional Data Modelling: A SurveyJournal-ref: International Journal of Advanced Research in Computer Science and Software (IJARCCE), Volume 1, Issue 1, March 2012Subjects: Databases (cs.DB)
- [34] arXiv:1208.0180 [pdf, ps, other]
-
Naming and Counting in Anonymous Unknown Dynamic NetworksSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
- [35] arXiv:1208.0186 [pdf, ps, other]
-
Opportunistic Forwarding with Partial CentralityComments: 9 pages and 7 figuresSubjects: Networking and Internet Architecture (cs.NI); Social and Information Networks (cs.SI)
- [36] arXiv:1208.0193 [pdf, other]
-
Matched Decoding for Punctured Convolutional Encoded Transmission Over ISI-ChannelsComments: 5 pages, 9 figures, submitted to SCC 13Subjects: Information Theory (cs.IT)
- [37] arXiv:1208.0200 [pdf]
-
Adaptation of pedagogical resources description standard (LOM) with the specificity of Arabic languageComments: 8 pages,10 figures. arXiv admin note: substantial text overlap with arXiv:1206.2009Subjects: Computation and Language (cs.CL)
- [38] arXiv:1208.0202 [pdf, other]
-
The Complexity of MaxMin Length TriangulationComments: 7 pages, 3 figuresSubjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
- [39] arXiv:1208.0203 [pdf]
-
Towards the Next Generation of Data Warehouse Personalization System: A Survey and a Comparative StudyComments: 8 pagesJournal-ref: IJCSI International Journal of Computer Science Issues, Vol 9, Issue 3, No 2, May 2012, pages 561-568Subjects: Databases (cs.DB)
- [40] arXiv:1208.0219 [pdf, other]
-
Functional Mechanism: Regression Analysis under Differential PrivacyComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1364-1375 (2012)Subjects: Databases (cs.DB)
- [41] arXiv:1208.0220 [pdf, other]
-
Publishing Microdata with a Robust Privacy GuaranteeComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1388-1399 (2012)Subjects: Databases (cs.DB)
- [42] arXiv:1208.0221 [pdf, other]
-
Measuring Two-Event Structural Correlations on GraphsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1400-1411 (2012)Subjects: Databases (cs.DB)
- [43] arXiv:1208.0222 [pdf, other]
-
Ranking Large Temporal DataComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1412-1423 (2012)Subjects: Databases (cs.DB)
- [44] arXiv:1208.0224 [pdf, other]
-
Compacting Transactional Data in Hybrid OLTP & OLAP DatabasesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1424-1435 (2012)Subjects: Databases (cs.DB)
- [45] arXiv:1208.0225 [pdf, other]
-
Processing a Trillion Cells per Mouse ClickComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1436-1446 (2012)Subjects: Databases (cs.DB)
- [46] arXiv:1208.0227 [pdf, other]
-
OLTP on Hardware IslandsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1447-1458 (2012)Subjects: Databases (cs.DB)
- [47] arXiv:1208.0257 [pdf, other]
-
Hamming Approximation of NP WitnessesJournal-ref: Theory of Computing 9(22), 2013, pp. 685-702Subjects: Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS)
- [48] arXiv:1208.0259 [pdf]
-
Electronic administration in Spain: from its beginnings to the presentJournal-ref: Government Information Quarterly, vol 28, 1, January 2011, pp. 74-90Subjects: Computers and Society (cs.CY); Digital Libraries (cs.DL)
- [49] arXiv:1208.0270 [pdf, other]
-
Serializability, not Serial: Concurrency Control and Availability in Multi-Datacenter DatastoresComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1459-1470 (2012)Subjects: Databases (cs.DB)
- [50] arXiv:1208.0271 [pdf, other]
-
Automatic Partitioning of Database ApplicationsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1471-1482 (2012)Subjects: Databases (cs.DB)
- [51] arXiv:1208.0273 [pdf, other]
-
Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog ServicesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1495-1506 (2012)Subjects: Databases (cs.DB)
- [52] arXiv:1208.0274 [pdf, other]
-
ALAE: Accelerating Local Alignment with Affine Gap Exactly in Biosequence DatabasesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1507-1518 (2012)Subjects: Databases (cs.DB)
- [53] arXiv:1208.0275 [pdf, other]
-
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature AlignmentsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1519-1530 (2012)Subjects: Databases (cs.DB)
- [54] arXiv:1208.0276 [pdf, other]
-
SCOUT: Prefetching for Latent Feature Following QueriesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1531-1542 (2012)Subjects: Databases (cs.DB)
- [55] arXiv:1208.0277 [pdf, other]
-
Accelerating Pathology Image Data Cross-Comparison on CPU-GPU Hybrid SystemsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1543-1554 (2012)Subjects: Databases (cs.DB)
- [56] arXiv:1208.0278 [pdf, other]
-
Robust Estimation of Resource Consumption for SQL Queries using Statistical TechniquesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1555-1566 (2012)Subjects: Databases (cs.DB)
- [57] arXiv:1208.0283 [pdf, ps, other]
-
A Parametric Worst-Case Approach to Fairness in TU-Cooperative GamesSubjects: Computer Science and Game Theory (cs.GT)
- [58] arXiv:1208.0285 [pdf, other]
-
Who Tags What? An Analysis FrameworkComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1567-1578 (2012)Subjects: Databases (cs.DB)
- [59] arXiv:1208.0286 [pdf, other]
-
A Generic Framework for Efficient and Effective Subsequence RetrievalComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1579-1590 (2012)Subjects: Databases (cs.DB)
- [60] arXiv:1208.0287 [pdf, other]
-
Only Aggressive Elephants are Fast ElephantsComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1591-1602 (2012)Subjects: Databases (cs.DB)
- [61] arXiv:1208.0288 [pdf, other]
-
Multiple Location Profiling for Users and Relationships from Social Network and ContentComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1603-1614 (2012)Subjects: Databases (cs.DB)
- [62] arXiv:1208.0289 [pdf, other]
-
Flash-based Extended Cache for Higher Throughput and Faster RecoveryComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1615-1626 (2012)Subjects: Databases (cs.DB)
- [63] arXiv:1208.0290 [pdf, other]
-
Don't Thrash: How to Cache Your Hash on FlashMichael A. Bender, Martin Farach-Colton, Rob Johnson, Russell Kraner, Bradley C. Kuszmaul, Dzejla Medjedovic, Pablo Montes, Pradeep Shetty, Richard P. Spillane, Erez ZadokComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1627-1637 (2012)Subjects: Databases (cs.DB)
- [64] arXiv:1208.0291 [pdf, other]
-
Learning Expressive Linkage Rules using Genetic ProgrammingComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1638-1649 (2012)Subjects: Databases (cs.DB)
- [65] arXiv:1208.0292 [pdf, other]
-
Mining Frequent Itemsets over Uncertain DatabasesComments: VLDB2012Journal-ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1650-1661 (2012)Subjects: Databases (cs.DB)
- [66] arXiv:1208.0293 [pdf, other]
-
The Distributed Ontology Language (DOL): Use Cases, Syntax, and ExtensibilityChristoph Lange, Till Mossakowski, Oliver Kutz, Christian Galinski, Michael Grüninger, Daniel Couto ValeComments: Terminology and Knowledge Engineering Conference (TKE) 2012-06-20 to 2012-06-21 Madrid, SpainSubjects: Artificial Intelligence (cs.AI); Digital Libraries (cs.DL); Logic in Computer Science (cs.LO)
- [67] arXiv:1208.0296 [pdf, ps, other]
-
Equilibria of Chinese AuctionsSubjects: Computer Science and Game Theory (cs.GT)
- [68] arXiv:1208.0312 [pdf, ps, other]
-
A Model for Minimizing Active Processor TimeSubjects: Data Structures and Algorithms (cs.DS)
- [69] arXiv:1208.0318 [pdf]
-
Artificial Neural Network Based Prediction of Optimal Pseudo-Damping and Meta-Damping in Oscillatory Fractional Order Dynamical SystemsComments: 7 pages, 9 figuresJournal-ref: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), art. no. 6216029 , pp. 350-356Subjects: Systems and Control (cs.SY); Neural and Evolutionary Computing (cs.NE)
- [70] arXiv:1208.0326 [pdf, ps, other]
-
Logarithmic Lipschitz norms and diffusion-induced instabilitySubjects: Systems and Control (cs.SY); Analysis of PDEs (math.AP)
- [71] arXiv:1208.0353 [pdf, other]
-
Signal Space CoSaMP for Sparse Recovery with Redundant DictionariesSubjects: Information Theory (cs.IT)
- [72] arXiv:1208.0359 [pdf]
-
An Automat for the Semantic Processing of Structured InformationComments: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89Journal-ref: IEEE Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on Date of Conference: Nov. 30 2009-Dec. 2 2009, Page(s): 85 - 89Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
- [73] arXiv:1208.0378 [pdf, other]
-
Fast Planar Correlation Clustering for Image SegmentationComments: This is the extended version of a paper to appear at the 12th European Conference on Computer Vision (ECCV 2012)Subjects: Computer Vision and Pattern Recognition (cs.CV); Data Structures and Algorithms (cs.DS); Learning (cs.LG); Machine Learning (stat.ML)
- [74] arXiv:1208.0383 [pdf, other]
-
An Economic Analysis of User-Privacy Options in Ad-Supported ServicesSubjects: Computer Science and Game Theory (cs.GT)
- [75] arXiv:1208.0384 [pdf, ps, other]
-
Global Adaptive Routing Algorithm Without Additional Congestion Propagation NetworkSubjects: Networking and Internet Architecture (cs.NI)
- [76] arXiv:1208.0395 [pdf, other]
-
Linear Time Algorithm for Optimal Feed-link PlacementSubjects: Computational Geometry (cs.CG)
- [77] arXiv:1208.0396 [pdf, other]
-
Solving Cyclic Longest Common Subsequence in Quadratic TimeComments: Updated references; an O(n^2) solution already exists, though it is terribly unwieldySubjects: Data Structures and Algorithms (cs.DS)
- [78] arXiv:1208.0400 [pdf, other]
-
Local public good provisioning in networks: A Nash implementation mechanismSubjects: Computer Science and Game Theory (cs.GT)
- [79] arXiv:1208.0402 [pdf, other]
-
Multidimensional Membership Mixture ModelsComments: 9 pages, 7 figuresSubjects: Learning (cs.LG); Machine Learning (stat.ML)
- [80] arXiv:1208.0403 [pdf]
-
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and ArtSubjects: Cryptography and Security (cs.CR)
- [81] arXiv:1208.0407 [pdf]
-
True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum AuctionsComments: 12pages, 7figuresSubjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
- [82] arXiv:1208.0408 [pdf]
-
Fixed Interfaces, Adaptive Interfaces... What is next? Total movability - a new paradigm for the user interfaceComments: 9 pages, 4 figuresSubjects: Human-Computer Interaction (cs.HC)
- [83] arXiv:1208.0412 [pdf, other]
-
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI InformationSubjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
- [84] arXiv:1208.0414 [pdf]
-
Grey Power Models Based on Optimization of Initial Condition and Model ParametersSubjects: Systems and Control (cs.SY); Optimization and Control (math.OC)
- [85] arXiv:1208.0432 [pdf, other]
-
Efficient Point-to-Subspace Query in $\ell^1$ with Application to Robust Object Instance RecognitionComments: Revised based on reviewers' feedback; one new experiment on synthesized data added; one section discussing the speed up addedJournal-ref: SIAM Journal on Imaging Sciences, 7(4):2105 - 2138, 2014Subjects: Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG); Machine Learning (stat.ML)
- [86] arXiv:1208.0435 [pdf, ps, other]
-
Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems with InterferenceComments: Accepted to appear in IEEE Transactions on CommunicationsSubjects: Information Theory (cs.IT)
- [87] arXiv:1208.0460 [pdf, other]
-
Diamond-free Degree SequencesComments: 8 pages, 2 figures, 2 algorithms, 2 models, 1 tableJournal-ref: Acta Univ. Sapientiae, Informatica, 4(2): 189-200, 2012Subjects: Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS)
- [88] arXiv:1208.0505 [pdf, other]
-
Criticality of Large Delay Tolerant Networks via Directed Continuum Percolation in Space-TimeSubjects: Performance (cs.PF); Networking and Internet Architecture (cs.NI)
- [89] arXiv:1208.0515 [pdf, ps, other]
-
On Constructor Rewrite Systems and the Lambda CalculusUgo Dal Lago (Università di Bologna - Dipartimento di Scienze dell'Informazione), Simone Martini (Università di Bologna - Dipartimento di Scienze dell'Informazione)Comments: 27 pages. arXiv admin note: substantial text overlap with arXiv:0904.4120Subjects: Programming Languages (cs.PL)
- [90] arXiv:1208.0525 [pdf, other]
-
An Upper Bound on the Convergence Time for Distributed Binary ConsensusComments: 15th International Conference on Information Fusion, July 2012, 7 pagesSubjects: Performance (cs.PF)
- [91] arXiv:1208.0526 [pdf, other]
-
Optimization hardness as transient chaos in an analog approach to constraint satisfactionComments: 27 pages, 14 figuresJournal-ref: Nature Physics, vol. 7, p. 966-970, 2011Subjects: Computational Complexity (cs.CC); Neural and Evolutionary Computing (cs.NE); Dynamical Systems (math.DS); Chaotic Dynamics (nlin.CD); Computational Physics (physics.comp-ph)
- [92] arXiv:1208.0535 [pdf, ps, other]
-
Modular Type-Safety Proofs using Dependant TypesComments: 8 pagesSubjects: Programming Languages (cs.PL)
- [93] arXiv:1208.0541 [pdf, ps, other]
-
A hybrid artificial immune system and Self Organising Map for network intrusion detectionComments: Post-print of accepted manuscript. 32 pages and 3 figuresJournal-ref: Information Sciences 178(15), pp. 3024-3042, August 2008Subjects: Neural and Evolutionary Computing (cs.NE); Cryptography and Security (cs.CR)
- [94] arXiv:1208.0542 [pdf]
-
A Constructive Algorithm to Prove P=NPComments: 4 pagesSubjects: Data Structures and Algorithms (cs.DS)
- [95] arXiv:1208.0554 [pdf, other]
-
Fast Monotone Summation over Disjoint SetsSubjects: Data Structures and Algorithms (cs.DS)
- [96] arXiv:1208.0562 [pdf, ps, other]
-
Learning the Interference Graph of a Wireless NetworkComments: submitted to IEEE Trans. Information TheorySubjects: Information Theory (cs.IT)
- [97] arXiv:1208.0564 [pdf]
-
Detection of Deviations in Mobile Applications Network BehaviorComments: Length of 10 pages, submitted to Annual Computer Security Applications Conference, ACSAC'2012Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
- [98] arXiv:1208.0569 [pdf]
-
Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANETComments: 14 pages,8 figures, International journal of computer engineering science(IJCES)Subjects: Networking and Internet Architecture (cs.NI)
- [99] arXiv:1208.0577 [pdf, ps]
-
Green Telecom Metrics in PerspectiveComments: Preprint submitted to APCC 2012 conferenceSubjects: Networking and Internet Architecture (cs.NI)
- [100] arXiv:1208.0581 [pdf, ps]
-
Optimal Degree of Optical Circuit Switching in IP-over-WDM NetworksComments: Long version of a manuscript originally submitted to ONDM 2012Subjects: Networking and Internet Architecture (cs.NI)
- [101] arXiv:1208.0590 [pdf]
-
Translation of Bengali Terms in Mobile Phones: a Simplified Approach Based on the Prescriptions of Conventional Accent Understand AbilityComments: ISSN 2249-2593Journal-ref: International Journal of Computer and Organization Trends (IJCOT) 2(1) 33-38 (2012)Subjects: Human-Computer Interaction (cs.HC)
- [102] arXiv:1208.0591 [pdf]
-
Hatch-Sens: a Theoretical Bio-Inspired Model to Monitor the Hatching of Plankton Culture in the Vicinity of Wireless Sensor NetworkComments: ISSN 0975-9646Journal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 3(4) 4764-4769 (2012)Subjects: Networking and Internet Architecture (cs.NI)
- [103] arXiv:1208.0592 [src]
-
Debugging Invariant Issues in Pseudo Embedded Program: an Analytical ApproachComments: This paper has been withdrawn by the author due to a crucial error in fig 1oJournal-ref: International Journal of Computer Science and Information Technologies (IJCSIT) 2(2) 780-785, 2011,Subjects: Software Engineering (cs.SE)
- [104] arXiv:1208.0593 [pdf]
-
The green grid saga - a green initiative to data centers: a reviewComments: ISSN 0976-5166Journal-ref: Indian Journal of Computer Science and Engineering (IJCSE) 1(4), 2010, 333-339Subjects: Systems and Control (cs.SY); Distributed, Parallel, and Cluster Computing (cs.DC)
- [105] arXiv:1208.0594 [pdf, ps, other]
-
Debugging Memory Issues In Embedded Linux: A Case StudyComments: In proceedings of IEEE TechSym 2011, 14-16 January, 2011, IIT kharagpur, IndiaSubjects: Software Engineering (cs.SE)
- [106] arXiv:1208.0615 [pdf, ps, other]
-
Enumerating Subgraph Instances Using Map-ReduceComments: 37 pagesSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
- [107] arXiv:1208.0627 [pdf, ps, other]
-
MLLS: Minimum Length Link Scheduling Under Physical Interference ModelComments: 8 pages, 1 figure, 2 tablesSubjects: Networking and Internet Architecture (cs.NI); Computer Science and Game Theory (cs.GT)
- [108] arXiv:1208.0631 [pdf, ps, other]
-
Economics of Electric Vehicle Charging: A Game Theoretic ApproachSubjects: Computer Science and Game Theory (cs.GT); Information Theory (cs.IT)
- [109] arXiv:1208.0645 [pdf, ps, other]
-
On the Consistency of AUC Pairwise OptimizationSubjects: Learning (cs.LG); Machine Learning (stat.ML)
- [110] arXiv:1208.0659 [pdf, other]
-
Embracing divergence: a formalism for when your semiring is simply not complete, with applications in quantum simulationComments: 54 pages, 5 figures; submitted to the special issue of Theoretical Computer Science A for the 2012 workshop Weighted Automata: Theory and Applications; v2 simplifies the formalism allowing the presentation to be streamlined, and fixes some problemsSubjects: Formal Languages and Automata Theory (cs.FL)
- [111] arXiv:1208.0664 [pdf, other]
-
Triggercast: Enabling Wireless Collisions ConstructiveComments: 10 pages, 18 figuresSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
- [112] arXiv:1208.0682 [pdf, ps, other]
-
Things that can be made into themselvesSubjects: Logic in Computer Science (cs.LO); Logic (math.LO)
- [113] arXiv:1208.0684 [pdf]
-
Comparative Evaluation of Data Stream Indexing ModelsJournal-ref: International Journal of Machine Learning and Computing vol. 2, no. 3, pp. 257-260, 2012Subjects: Databases (cs.DB)
- [114] arXiv:1208.0688 [pdf, other]
-
Efficient and Secure Key Extraction using CSI without Chasing down ErrorsComments: Submitted to INFOCOM 2013Subjects: Cryptography and Security (cs.CR)
- [115] arXiv:1208.0690 [pdf]
-
Semantic Web Requirements through Web Mining TechniquesComments: arXiv admin note: text overlap with arXiv:cs/0011033 by other authorsJournal-ref: International Journal of Computer Theory and Engineering vol. 4, no. 4, pp. 616-620, 2012Subjects: Information Retrieval (cs.IR); Digital Libraries (cs.DL)
- [116] arXiv:1208.0699 [pdf, ps, other]
-
Imperfect best-response mechanismsComments: In the conference version of this work, we claimed that in a modified version of PageRank games, there exists a subgame which is a potential game and thus our results can be used to obtain a good approximation of the logit dynamics for these games. Unfortunately, this claim was wrong and the logit dynamics for this subgame is in general not easy to analyzeSubjects: Computer Science and Game Theory (cs.GT); Computational Complexity (cs.CC)
- [117] arXiv:1208.0701 [pdf, other]
-
Numerical Computations For Operator AxiomComments: 39 pages, 2 figuresSubjects: Numerical Analysis (cs.NA)
- [118] arXiv:1208.0712 [pdf, ps, other]
-
Description of the Chord Protocol using ASMs FormalismSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
- [119] arXiv:1208.0713 [pdf, ps, other]
-
On logical hierarchies within FO^2-definable languagesManfred Kufleitner (Institut f), Pascal Weil (LaBRI, Université de Bordeaux and CNRS)Comments: arXiv admin note: text overlap with arXiv:0904.2894Journal-ref: LMCS 8 (3:11) 2012Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
- [120] arXiv:1208.0722 [pdf, other]
-
Vertex Nim played on graphsSubjects: Discrete Mathematics (cs.DM); Computer Science and Game Theory (cs.GT); Combinatorics (math.CO)
- [121] arXiv:1208.0755 [pdf]
-
Universal Numeric Segment Display for Indian Scheduled Languages: an Architectural ViewComments: ISSN 2231-2803. arXiv admin note: text overlap with arXiv:1009.4977 by other authorsJournal-ref: International Journal of Computer Trends and Technology (IJCTT) 2(2/2) 161-166 (2011)Subjects: Other Computer Science (cs.OH)
- [122] arXiv:1208.0770 [pdf]
-
Web based e-learning in india: the cumulative views of different aspectsComments: ISSN 0976-5166Journal-ref: Indian Journal of Computer Science and Engineering 1(4), 2010, 340-352Subjects: Computers and Society (cs.CY)
- [123] arXiv:1208.0782 [pdf, other]
-
Wisdom of the Crowd: Incorporating Social Influence in Recommendation ModelsComments: HotPost 2011, 6 pagesSubjects: Information Retrieval (cs.IR); Learning (cs.LG); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
- [124] arXiv:1208.0787 [pdf, other]
-
A Random Walk Based Model Incorporating Social Information for RecommendationsComments: 2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6 pagesSubjects: Information Retrieval (cs.IR); Learning (cs.LG)
- [125] arXiv:1208.0798 [pdf, ps, other]
-
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data SetsComments: 5 pages, Corrected typos from ISIT 2012 conference versionSubjects: Data Structures and Algorithms (cs.DS)
- [126] arXiv:1208.0803 [pdf]
-
A Novel Approach of Color Image Hiding using RGB Color planes and DWTComments: 6 pages, 14 figures, Published with International Journal of Computer Applications (IJCA)Journal-ref: International Journal of Computer Applications 36(5):19-24, December 2011Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
- [127] arXiv:1208.0805 [pdf, ps, other]
-
On the control of abelian group codes with information group of prime orderComments: 12 pages, 2 figuresSubjects: Information Theory (cs.IT); Group Theory (math.GR)
- [128] arXiv:1208.0811 [pdf, ps, other]
-
Efficient Algorithms for Maximum Link Scheduling in Distributed Computing Models with SINR ConstraintsSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
- [129] arXiv:1208.0812 [pdf, other]
-
On the chromatic number of a random hypergraphComments: 45 pages, 2 figures, revised versionSubjects: Discrete Mathematics (cs.DM); Combinatorics (math.CO)
- [130] arXiv:1208.0848 [pdf, ps, other]
-
Learning Theory Approach to Minimum Error Entropy CriterionJournal-ref: JMLR 2013Subjects: Learning (cs.LG); Machine Learning (stat.ML)
- [131] arXiv:1208.0887 [pdf]
-
Implementations of ICT Innovations: A Comparative Analysis in terms of Challenges between Developed and Developing CountriesJournal-ref: International Journal of Information, Business and Management, 4(1), 2012Subjects: Computers and Society (cs.CY)
- [132] arXiv:1208.0891 [pdf]
-
A Framework of Value Exchange and Role Playing in Web 2.0 WebSitesJournal-ref: European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS 2012), 2012Subjects: Computers and Society (cs.CY)
- [133] arXiv:1208.0892 [pdf]
-
Portals and Task Innovation: A Theoretical Framework Founded on Business Intelligence ThinkingJournal-ref: The Eleventh Annual International Conference on Business Intelligenece and Knowledge Economy, 2012Subjects: Other Computer Science (cs.OH)
- [134] arXiv:1208.0902 [pdf, ps, other]
-
Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical InterferenceComments: 14 pagesSubjects: Networking and Internet Architecture (cs.NI)
- [135] arXiv:1208.0944 [pdf]
-
Establishing Virtual R&D Teams: Obliged PolicyComments: 6th IMC (International Management Conference). Tehran, Iran 2008Subjects: Other Computer Science (cs.OH)
Computer Science authors/titles Aug 2012
No comments:
Post a Comment