Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science

Authors and titles for July 2010

Total of 586 entries : 1-50 51-100 101-150 151-200 201-250 251-300 ... 551-586
Showing up to 50 entries per page: fewer | more | all
[101] arXiv:1007.0920 [pdf, other]
Title: End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions
Bela Genge, Piroska Haller
Comments: 9th RoEduNet IEEE International Conference, Sibiu, Romania, 2010
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[102] arXiv:1007.0931 [pdf, other]
Title: LDPC Code Design for Transmission of Correlated Sources Across Noisy Channels Without CSIT
Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan
Comments: 5 pages, 5 figures, to appear in ISTC 2010
Subjects: Information Theory (cs.IT)
[103] arXiv:1007.0936 [pdf, other]
Title: Linguistic complexity: English vs. Polish, text vs. corpus
Jaroslaw Kwapien, Stanislaw Drozdz, Adam Orczyk
Journal-ref: Acta Phys. Pol. A 117, 716-720 (2010)
Subjects: Computation and Language (cs.CL); Physics and Society (physics.soc-ph)
[104] arXiv:1007.0940 [pdf, other]
Title: An axiomatic formalization of bounded rationality based on a utility-information equivalence
Pedro A. Ortega, Daniel A. Braun
Comments: 22 pages, 4 figures, 1 table
Subjects: Artificial Intelligence (cs.AI); Computer Science and Game Theory (cs.GT)
[105] arXiv:1007.0960 [pdf, other]
Title: Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance
Gautam S. Thakur, Udayan Kumar, Ahmed Helmy, Wei-Jen Hsu
Subjects: Networking and Internet Architecture (cs.NI)
[106] arXiv:1007.0982 [pdf, other]
Title: MIMO B-MAC Interference Network Optimization under Rate Constraints by Polite Water-filling and Duality
An Liu, Youjian (Eugene)Liu, Haige Xiang, Wu Luo
Comments: 30 pages, 8 figures, and 5 tables. Submitted to IEEE Transactions on Signal Processing, Jun. 2010
Journal-ref: An Liu; Youjian Liu; Haige Xiang; Wu Luo, "MIMO B-MAC Interference Network Optimization Under Rate Constraints by Polite Water-Filling and Duality," IEEE Transactions on Signal Processing, vol.59, no.1, pp.263,276, Jan. 2011
Subjects: Information Theory (cs.IT)
[107] arXiv:1007.1016 [pdf, other]
Title: Bilateral filters: what they can and cannot do
Oleg S. Pianykh
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[108] arXiv:1007.1020 [pdf, other]
Title: Handling software upgradeability problems with MILP solvers
Claude Michel (University of Nice - Sophia Antipolis / I3S-CNRS), Michel Rueher (University of Nice - Sophia Antipolis / I3S-CNRS)
Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831
Journal-ref: EPTCS 29, 2010, pp. 1-10
Subjects: Logic in Computer Science (cs.LO)
[109] arXiv:1007.1021 [pdf, other]
Title: Solving Linux Upgradeability Problems Using Boolean Optimization
Josep Argelich (DIEI), Daniel Le Berre (CRIL-CNRS), Inês Lynce (INESC-ID/IST), Joao Marques-Silva (CSI/CASL), Pascal Rapicault (Sonatype)
Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831
Journal-ref: EPTCS 29, 2010, pp. 11-22
Subjects: Logic in Computer Science (cs.LO)
[110] arXiv:1007.1022 [pdf, other]
Title: Comparison of PBO solvers in a dependency solving domain
Paulo Trezentos (ISCTE / ADETTI / Caixa Mágica)
Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831
Journal-ref: EPTCS 29, 2010, pp. 23-31
Subjects: Software Engineering (cs.SE); Logic in Computer Science (cs.LO)
[111] arXiv:1007.1023 [pdf, other]
Title: CONFIGEN: A tool for managing configuration options
Emmanuel Ohayon (CEA LIST), Matthieu Lemerre (CEA LIST), Vincent David (CEA LIST)
Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831
Journal-ref: EPTCS 29, 2010, pp. 32-43
Subjects: Software Engineering (cs.SE)
[112] arXiv:1007.1024 [pdf, other]
Title: Model Counting in Product Configuration
Andreas Kübler (Symbolic Computation Group, Wilhelm Schickard Institute for Computer Science, Universität Tübingen, Germany), Christoph Zengler (Symbolic Computation Group, Wilhelm Schickard Institute for Computer Science, Universität Tübingen, Germany), Wolfgang Küchlin (Symbolic Computation Group, Wilhelm Schickard Institute for Computer Science, Universität Tübingen, Germany)
Comments: In Proceedings LoCoCo 2010, arXiv:1007.0831
Journal-ref: EPTCS 29, 2010, pp. 44-53
Subjects: Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO); Symbolic Computation (cs.SC)
[113] arXiv:1007.1025 [pdf, other]
Title: Inflection system of a language as a complex network
Henryk Fukś
Comments: 6 pages, 9 figures
Journal-ref: Proceedings of 2009 IEEE Toronto International Conference - Science and Technology for Humanity, IEEE, Toronto 2009, pp. 491-496
Subjects: Computation and Language (cs.CL); Adaptation and Self-Organizing Systems (nlin.AO)
[114] arXiv:1007.1033 [pdf, other]
Title: A Theory of Network Equivalence, Parts I and II
Ralf Koetter, Michelle Effros, Muriel Medard
Comments: 91 pages, 18 figures. Submitted to the IEEE Transactions on Information Theory on April 14, 2010. Draft 2
Subjects: Information Theory (cs.IT)
[115] arXiv:1007.1045 [pdf, other]
Title: Weighted Automata and Recurrence Equations for Regular Languages
Edoardo Carta-Gerardino, Parisa Babaali
Comments: 14 pages, 6 figures
Subjects: Formal Languages and Automata Theory (cs.FL); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[116] arXiv:1007.1048 [pdf, other]
Title: Registration of Brain Images using Fast Walsh Hadamard Transform
D.Sasikala, R.Neelaveni
Comments: 10 pages, 37 figures, 12 tables
Journal-ref: (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[117] arXiv:1007.1049 [pdf, other]
Title: Simple Gradecast Based Algorithms
Michael Ben-Or, Danny Dolev, Ezra N. Hoch
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[118] arXiv:1007.1054 [pdf, other]
Title: Compositional closure for Bayes Risk in probabilistic noninterference
Annabelle McIver, Larissa Meinicke, Carroll Morgan
Subjects: Formal Languages and Automata Theory (cs.FL)
[119] arXiv:1007.1059 [pdf, other]
Title: On the solution of the Graph Isomorphism Problem Part 1
Leonid Malinin, Natalia Malinina
Comments: Microsoft Wopd 2007 46 pages with 38 figures
Subjects: Computational Complexity (cs.CC); General Mathematics (math.GM)
[120] arXiv:1007.1069 [pdf, other]
Title: On the instantaneous frequency of Gaussian stochastic processes
Patrik Wahlberg, Peter J. Schreier
Comments: 22 pages
Subjects: Information Theory (cs.IT); Probability (math.PR)
[121] arXiv:1007.1073 [pdf, other]
Title: Learning Read-Once Functions Using Subcube Identity Queries
Dmitry V. Chistikov, Andrey A. Voronenko
Comments: Submitted to SODA11
Subjects: Computational Complexity (cs.CC)
[122] arXiv:1007.1079 [pdf, other]
Title: Intelligent data analysis based on the complex network theory methods: a case study
O. Mryglod, Yu. Holovatch
Comments: Based on the presentation on the X International PhD Workshop OWD'2008, 18-21 October 2008, Wisla, Poland
Journal-ref: Mryglod O., Yu. Holovatch. Intelligent data analysis based on the complex network theory methods: a case study. Proc of the X International PhD Workshop [OWD-2008], Poland, Wis{\l}a, 18-21 October, 2008, - P. 211
Subjects: Information Retrieval (cs.IR); Data Analysis, Statistics and Probability (physics.data-an)
[123] arXiv:1007.1086 [pdf, other]
Title: On the Power of Impersonation Attacks
Michael Okun
Comments: This is the full version of a brief announcement (under the same name), which appeared in Proc. 21st International Symposium on Distributed Computing (DISC 07)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[124] arXiv:1007.1087 [pdf, other]
Title: Competition of Wireless Providers for Atomic Users
Vojislav Gajić, Jianwei Huang, Bixio Rimoldi
Comments: Submitted to IEEE/ACM Transactions on Networking, June 2010
Subjects: Information Theory (cs.IT); Computer Science and Game Theory (cs.GT)
[125] arXiv:1007.1100 [pdf, other]
Title: Collision Codes: Decoding Superimposed BPSK Modulated Wireless Transmissions
Chuan Heng Foh, Jianfei Cai, Jalaluddin Qureshi
Subjects: Networking and Internet Architecture (cs.NI)
[126] arXiv:1007.1120 [pdf, other]
Title: Stability of Hodge decompositions in finite element spaces of differential forms in arbitrary dimension
Snorre Harald Christiansen
Comments: 26 pages
Journal-ref: Numerische Mathematik, Vol. 107, No. 1, p. 87-106, 2007
Subjects: Numerical Analysis (math.NA)
[127] arXiv:1007.1146 [pdf, other]
Title: Exponential Time Complexity of Weighted Counting of Independent Sets
Christian Hoffmann
Comments: Introduction revised, differences between versions of counting independent sets stated more precisely, minor improvements. 14 pages
Subjects: Computational Complexity (cs.CC); Statistical Mechanics (cond-mat.stat-mech)
[128] arXiv:1007.1161 [pdf, other]
Title: Narrow sieves for parameterized paths and packings
Andreas Björklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto
Subjects: Data Structures and Algorithms (cs.DS)
[129] arXiv:1007.1166 [pdf, other]
Title: Using CSP To Improve Deterministic 3-SAT
Konstantin Kutzkov, Dominik Scheder
Comments: corrected typos, extended the introduction and added a notation section to make paper self-contained
Subjects: Data Structures and Algorithms (cs.DS)
[130] arXiv:1007.1174 [pdf, other]
Title: Group Based Interference Alignment
Yanjun Ma, Jiandong Li, Qin Liu, Rui Chen
Comments: 3 pages, 3 figures. resubmitted to IEEE Communications Letters
Subjects: Information Theory (cs.IT)
[131] arXiv:1007.1189 [pdf, other]
Title: A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
Andrea Richa, Christian Scheideler, Stefan Schmid, Jin Zhang
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[132] arXiv:1007.1194 [pdf, other]
Title: Inter-Sensing Time Optimization in Cognitive Radio Networks
Omar Mehanna, Ahmed Sultan
Comments: 9 pages, 4 figures, submitted to IEEE transactions on Mobile Computing
Subjects: Networking and Internet Architecture (cs.NI)
[133] arXiv:1007.1209 [pdf, other]
Title: Prime Factor Cyclotomic Fourier Transforms with Reduced Complexity over Finite Fields
Xuebin Wu, Zhiyuan Yan, Ning Chen, Meghanad Wagh
Comments: submitted to SiPS 2010, accepted
Subjects: Information Theory (cs.IT)
[134] arXiv:1007.1213 [pdf, other]
Title: Composite Cyclotomic Fourier Transforms with Reduced Complexities
Xuebin Wu, Meghanad Wagh, Ning Chen, Zhiyuan Yan, Ying Wang
Comments: submitted to IEEE trans on Signal Processing
Subjects: Information Theory (cs.IT)
[135] arXiv:1007.1222 [pdf, other]
Title: Minimum Sum Dipolar Spanning Tree in R^3
Steven Bitner, Ovidiu Daescu
Comments: 11 pages, 4 figures, submitted to Computational Geometry: Theory and Applications
Subjects: Computational Geometry (cs.CG)
[136] arXiv:1007.1229 [pdf, other]
Title: Submodularity on a tree: Unifying $L^\natural$-convex and bisubmodular functions
Vladimir Kolmogorov
Comments: 14 pages
Subjects: Discrete Mathematics (cs.DM)
[137] arXiv:1007.1233 [pdf, other]
Title: An Alternative Approach of Steganography using Reference Image
Samir Kumar Bandyopadhyay, Indra Kanta Maitra
Comments: this http URL . arXiv admin note: text overlap with this http URL by other authors without attribution
Journal-ref: International Journal of Advancements in Technology, Vol 1, No 1 (2010)
Subjects: Multimedia (cs.MM)
[138] arXiv:1007.1243 [pdf, other]
Title: New Results on the Capacity of the Gaussian Cognitive Interference Channel
Stefano Rini, Daniela Tuninetti, Natasha Devroye
Subjects: Information Theory (cs.IT)
[139] arXiv:1007.1253 [pdf, other]
Title: Efficient Sketches for the Set Query Problem
Eric Price
Comments: 16 pages, 2 figures. Appearing in SODA 2011
Subjects: Data Structures and Algorithms (cs.DS); Information Theory (cs.IT)
[140] arXiv:1007.1255 [pdf, other]
Title: Queue-Architecture and Stability Analysis in Cooperative Relay Networks
Jubin Jose, Sriram Vishwanath
Comments: 16 pages, 1 figure
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT)
[141] arXiv:1007.1259 [pdf, other]
Title: Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
Michael T. Goodrich, Michael Mitzenmacher
Comments: A more complete version of a paper appearing in the 38th International Colloquium on Automata, Languages and Programming (ICALP) 2011
Subjects: Data Structures and Algorithms (cs.DS); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[142] arXiv:1007.1260 [pdf, other]
Title: A Dense Hierarchy of Sublinear Time Approximation Schemes for Bin Packing
Richard Beigel, Bin Fu
Subjects: Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS)
[143] arXiv:1007.1261 [pdf, other]
Title: MalStone: Towards A Benchmark for Analytics on Large Data Clouds
Collin Bennett, Robert L. Grossman, David Locke, Jonathan Seidman, Steve Vejcik
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[144] arXiv:1007.1264 [pdf, other]
Title: Network Traffic Anomalies Detection and Identification with Flow Monitoring
Huy Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi
Comments: Presented at 5th International Conference on Wireless and Optical Communications Networks (WOCN'08) May 5-7, 2008, Surabaya, East Java Indonesia
Subjects: Networking and Internet Architecture (cs.NI)
[145] arXiv:1007.1265 [pdf, other]
Title: Context Awareness Framework Based on Contextual Graph
Tam Van Nguyen, Wontaek Lim, Huy Nguyen, Deokjai Choi
Comments: Presented at The 5th International Conference on Wireless and Optical Communications Networks (WOCN'08) May 5-7, 2008, Surabaya, East Java Indonesia
Subjects: Networking and Internet Architecture (cs.NI)
[146] arXiv:1007.1266 [pdf, other]
Title: Network Anomaly Detection: Flow-based or Packet-based Approach?
Huy Nguyen, Deokjai Choi
Comments: Published on Chonnam National University Networking Journal, Gwangju, Korea June 2008
Subjects: Networking and Internet Architecture (cs.NI)
[147] arXiv:1007.1267 [pdf, other]
Title: Shifted Power Method for Computing Tensor Eigenpairs
Tamara G. Kolda, Jackson R. Mayo
Journal-ref: SIAM Journal on Matrix Analysis and Applications, 32(4):1095-1124, 2011
Subjects: Numerical Analysis (math.NA)
[148] arXiv:1007.1268 [pdf, other]
Title: Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
Huy Nguyen, Deokjai Choi
Comments: Presented at The 11th Asia-Pacific Network Operations and Management Symposium (APNOMS 2008)
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI)
[149] arXiv:1007.1269 [pdf, other]
Title: From Pathwidth to Connected Pathwidth
Dariusz Dereniowski
Journal-ref: SIAM J. Discrete Mathematics 26 (2012) 1709-1732
Subjects: Discrete Mathematics (cs.DM)
[150] arXiv:1007.1270 [pdf, other]
Title: How to Maximize User Satisfaction Degree in Multi-service IP Networks
Huy Nguyen, Tam Van Nguyen, Deokjai Choi
Comments: Presented at The First Asia Conference on Intelligent Information and Database Systems April, 1-3, 2009, Dong Hoi City, Quang Binh province, Vietnam
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI)
Total of 586 entries : 1-50 51-100 101-150 151-200 201-250 251-300 ... 551-586
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack