Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science

Authors and titles for January 2016

Total of 1601 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 351-400 ... 1601-1601
Showing up to 50 entries per page: fewer | more | all
[201] arXiv:1601.01220 [pdf, other]
Title: The Impact of Project Management in Virtual Environment: A Software Industry Perspective
Bashini Jeewanthi Gamage
Comments: 5, University Of Sri Jayewardenepura, 2016
Subjects: Computers and Society (cs.CY); Software Engineering (cs.SE)
[202] arXiv:1601.01222 [pdf, other]
Title: Fractal social organization as a foundation to pervasive social computing services
Vincenzo De Florio
Comments: The paper makes use, in minimal part, of text and pictures from papers [18,19,20,21]. Figure 1 is (c) Copyright Okefenokee Glee & Perloo, Inc. It is used by permission
Subjects: Computers and Society (cs.CY)
[203] arXiv:1601.01228 [pdf, other]
Title: Some Experimental Issues in Financial Fraud Detection: An Investigation
J. West, Maumita Bhattacharya
Comments: J. West and Maumita Bhattacharya. "Some Experimental Issues in Financial Fraud Detection: An Investigation", In the Proceedings of The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[204] arXiv:1601.01229 [pdf, other]
Title: A Comprehensive Formal Security Analysis of OAuth 2.0
Daniel Fett, Ralf Kuesters, Guido Schmitz
Comments: An abridged version appears in CCS 2016. Parts of this work extend the web model presented in arXiv:1411.7210, arXiv:1403.1866 and arXiv:1508.01719
Subjects: Cryptography and Security (cs.CR)
[205] arXiv:1601.01230 [pdf, other]
Title: BYOD Security: A New Business Challenge
K. Downer, Maumita Bhattacharya
Comments: K. Downer and Maumita Bhattacharya. "BYOD Security: A New Business Challenge", accepted for publication in Proceedings of The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[206] arXiv:1601.01232 [pdf, other]
Title: Shape Animation with Combined Captured and Simulated Dynamics
Benjamin Allain, Li Wang, Jean-Sebastien Franco, Franck Hetroy, Edmond Boyer
Subjects: Graphics (cs.GR); Computer Vision and Pattern Recognition (cs.CV)
[207] arXiv:1601.01233 [pdf, other]
Title: (Leftmost-Outermost) Beta Reduction is Invariant, Indeed
Beniamino Accattoli (INRIA), Ugo Dal Lago (University of Bologna & INRIA)
Comments: arXiv admin note: substantial text overlap with arXiv:1405.3311
Journal-ref: Logical Methods in Computer Science, Volume 12, Issue 1 (March 9, 2016) lmcs:1627
Subjects: Programming Languages (cs.PL); Logic in Computer Science (cs.LO)
[208] arXiv:1601.01242 [pdf, other]
Title: Fixed-point algorithms for frequency estimation and structured low rank approximation
Fredrik Andersson, Marcus Carlsson
Subjects: Numerical Analysis (math.NA)
[209] arXiv:1601.01245 [pdf, other]
Title: Loop Free Multipath Routing Algorithm
Rashmi Singh, Yatindra Nath Singh, Anita Yadav
Subjects: Networking and Internet Architecture (cs.NI)
[210] arXiv:1601.01261 [pdf, other]
Title: A rational approximation of the Dawson's integral for efficient computation of the complex error function
S. M. Abrarov, B. M. Quine
Comments: 37 pages, 7 figures
Journal-ref: Appl. Math. Comput., 321 (2018) 526-543
Subjects: Numerical Analysis (math.NA)
[211] arXiv:1601.01271 [pdf, other]
Title: Hierarchical stability of nonlinear hybrid systems
Mario Sassano, Luca Zaccarian
Subjects: Systems and Control (eess.SY)
[212] arXiv:1601.01272 [pdf, other]
Title: Recurrent Memory Networks for Language Modeling
Ke Tran, Arianna Bisazza, Christof Monz
Comments: 8 pages, 6 figures. Accepted at NAACL 2016
Subjects: Computation and Language (cs.CL)
[213] arXiv:1601.01274 [pdf, other]
Title: Encoding and Decoding Algorithms for Arbitrary Dimensional Hilbert Order
Hui Liu, Tao Cui, Wei Leng, Linbo Zhang
Subjects: Symbolic Computation (cs.SC)
[214] arXiv:1601.01278 [pdf, other]
Title: Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks
Roman Lutz
Comments: 11 pages
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[215] arXiv:1601.01280 [pdf, other]
Title: Language to Logical Form with Neural Attention
Li Dong, Mirella Lapata
Comments: Accepted by ACL-16
Subjects: Computation and Language (cs.CL)
[216] arXiv:1601.01286 [pdf, other]
Title: Strong Secrecy for Cooperative Broadcast Channels
Ziv Goldfeld, Gerhard Kramer, Haim H. Permuter, Paul Cuff
Subjects: Information Theory (cs.IT)
[217] arXiv:1601.01289 [pdf, other]
Title: Internet of Drones
Mirmojtaba Gharibi, Raouf Boutaba, Steven L. Waslander
Subjects: Networking and Internet Architecture (cs.NI); Robotics (cs.RO)
[218] arXiv:1601.01297 [pdf, other]
Title: Angrier Birds: Bayesian reinforcement learning
Imanol Arrieta Ibarra, Bernardo Ramos, Lars Roemheld
Comments: Stanford University CS221 Final Project
Subjects: Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[219] arXiv:1601.01298 [pdf, other]
Title: Visibility Graphs, Dismantlability, and the Cops and Robbers Game
Anna Lubiw, Jack Snoeyink, Hamideh Vosoughpour
Comments: 23 pages
Subjects: Computational Geometry (cs.CG)
[220] arXiv:1601.01336 [pdf, other]
Title: A Serial Multilevel Hypergraph Partitioning Algorithm
Foad Lotfifar, Matthew Johnson
Subjects: Data Structures and Algorithms (cs.DS)
[221] arXiv:1601.01339 [pdf, other]
Title: Quality Adaptive Low-Rank Based JPEG Decoding with Applications
Xiao Shu, Xiaolin Wu
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[222] arXiv:1601.01343 [pdf, other]
Title: Joint Learning of the Embedding of Words and Entities for Named Entity Disambiguation
Ikuya Yamada, Hiroyuki Shindo, Hideaki Takeda, Yoshiyasu Takefuji
Comments: Accepted at CoNLL 2016
Subjects: Computation and Language (cs.CL)
[223] arXiv:1601.01348 [pdf, other]
Title: An Online Delay Efficient Packet Scheduler for M2M Traffic in Industrial Automation
Akshay Kumar, Ahmed Abdelhadi, Charles Clancy
Comments: 6 pages, 7 figures, Accepted for publication in IEEE Systems Conference 2016
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT); Performance (cs.PF)
[224] arXiv:1601.01356 [pdf, other]
Title: From Word Embeddings to Item Recommendation
Makbule Gulcin Ozsoy
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Information Retrieval (cs.IR); Social and Information Networks (cs.SI)
[225] arXiv:1601.01360 [pdf, other]
Title: Proportionate Affine Projection Algorithms for Block-sparse System Identification
Jianming Liu, Steven L. Grant
Comments: ICASSP 2016
Subjects: Information Theory (cs.IT)
[226] arXiv:1601.01363 [pdf, other]
Title: Convergence Analysis of the Gaussian Regularized Shannon Sampling Formula
Rongrong Lin, Haizhang Zhang
Subjects: Information Theory (cs.IT)
[227] arXiv:1601.01372 [pdf, other]
Title: Constant-factor approximations for asymmetric TSP on nearly-embeddable graphs
Daniel Marx, Ario Salmasi, Anastasios Sidiropoulos
Subjects: Data Structures and Algorithms (cs.DS); Computational Geometry (cs.CG)
[228] arXiv:1601.01376 [pdf, other]
Title: Area Spectral Efficiency Analysis and Energy Consumption Minimization in Multi-Antenna Poisson Distributed Networks
Zheng Chen, Ling Qiu, Xiaowen Liang
Comments: Submitted to IEEE Transactions on Wireless Communications, Major Revision
Subjects: Information Theory (cs.IT)
[229] arXiv:1601.01379 [pdf, other]
Title: User-Centric Interference Nulling in Downlink Multi-Antenna Heterogeneous Networks
Ying Cui, Yueping Wu, Dongdong Jiang, Bruno Clerckx
Comments: Transactions on Wireless Communications (under revision). arXiv admin note: text overlap with arXiv:1504.05283
Subjects: Information Theory (cs.IT)
[230] arXiv:1601.01386 [pdf, other]
Title: A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images
Khan Muhammad, Jamil Ahmad, Haleem Farman, Zahoor Jan
Comments: A short paper of 6 pages
Journal-ref: Sindh University Research Journal-SURJ (Science Series) 47.4 (2015)
Subjects: Multimedia (cs.MM)
[231] arXiv:1601.01394 [pdf, other]
Title: On the Search Algorithm for the Output Distribution that Achieves the Channel Capacity
Kenji Nakagawa, Kohei Watabe, Takuto Sabu
Comments: 45 pages, 9 figures, submitted to IEEE Transactions on Information Theory
Subjects: Information Theory (cs.IT)
[232] arXiv:1601.01396 [pdf, other]
Title: On the Computation of the Optimal Connecting Points in Road Networks
George Tsatsanifos
Comments: This submission has been withdrawn by arXiv administrators due to disputed authorship
Subjects: Data Structures and Algorithms (cs.DS)
[233] arXiv:1601.01398 [pdf, other]
Title: A Proof-of-Concept Device-to-Device Communication Testbed
Vibhutesh Kumar Singh, Hardik Chawla, Vivek Ashok Bohara
Comments: 8th International Conference on COMmunication Systems & NETworkS (COMSNETS 2016), Demos & Exhibits Session
Subjects: Networking and Internet Architecture (cs.NI)
[234] arXiv:1601.01405 [pdf, other]
Title: BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning
Charles Noyes
Subjects: Cryptography and Security (cs.CR)
[235] arXiv:1601.01408 [pdf, other]
Title: Comparison of cinepak, intel, microsoft video and indeo codec for video compression
Suleiman Mustafa, Hannan Xiao
Comments: 13 pages, 1 figure, 7 tables, journal paper
Journal-ref: The International Journal of Multimedia and Its Applications (IJMA), Volume 7, Number 6 December 2015
Subjects: Multimedia (cs.MM)
[236] arXiv:1601.01410 [pdf, other]
Title: Sparse signals for the control of human movements using the infinity norm
Geoffrey George Gamble, Mehrdad Yazdani
Subjects: Systems and Control (eess.SY)
[237] arXiv:1601.01411 [pdf, other]
Title: Learning Kernels for Structured Prediction using Polynomial Kernel Transformations
Chetan Tonde, Ahmed Elgammal
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[238] arXiv:1601.01419 [pdf, other]
Title: Absolute Trust: Algorithm for Aggregation of Trust in Peer-to- Peer Networks
Sateesh Kumar Awasthi, Yatindra Nath Singh
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)
[239] arXiv:1601.01421 [pdf, other]
Title: Repeated-root constacyclic codes of length $3lp^{s}$ and their dual codes
Li Liu, Lanqiang Li, Xiaoshan Kai, Shixin Zhu
Subjects: Information Theory (cs.IT)
[240] arXiv:1601.01422 [pdf, other]
Title: Stochastic Dykstra Algorithms for Metric Learning on Positive Semi-Definite Cone
Tomoki Matsuzawa, Raissa Relator, Jun Sese, Tsuyoshi Kato
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[241] arXiv:1601.01423 [pdf, other]
Title: A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks
Huijuan Zhang, Kai Liu
Subjects: Networking and Internet Architecture (cs.NI)
[242] arXiv:1601.01427 [pdf, other]
Title: Physical Layer Security in Heterogeneous Cellular Networks
Hui-Ming Wang, Tong-Xing Zheng, Jinhong Yuan, Don Towsley, Moon Ho Lee
Comments: two-column 15 pages, 12 figures, accepted for publication in IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)
[243] arXiv:1601.01429 [pdf, other]
Title: An adaptive algorithm based on the shifted inverse iteration for the Steklov eigenvalue problem
Hai Bi, Hao Li, Yidu Yang
Subjects: Numerical Analysis (math.NA)
[244] arXiv:1601.01431 [pdf, other]
Title: Mixture of Bilateral-Projection Two-dimensional Probabilistic Principal Component Analysis
Fujiao Ju, Yanfeng Sun, Junbin Gao, Simeng Liu, Yongli Hu
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[245] arXiv:1601.01432 [pdf, other]
Title: Block-Diagonal Sparse Representation by Learning a Linear Combination Dictionary for Recognition
Xinglin Piao, Yongli Hu, Yanfeng Sun, Junbin Gao, Baocai Yin
Comments: We want to withdraw this paper because we need more mathematical derivation and experiments to support our method. Therefore, we think this paper is not suitable to be published in this period
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[246] arXiv:1601.01435 [pdf, other]
Title: Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems
Meng Zhang, Yuan Liu, Rui Zhang
Comments: To appeal in IEEE Transactions on Wireless Communications
Subjects: Information Theory (cs.IT)
[247] arXiv:1601.01436 [pdf, other]
Title: High quality local interpolation by composite parametric surfaces
Michele Antonelli, Carolina Vittoria Beccari, Giulio Casciola
Subjects: Numerical Analysis (math.NA)
[248] arXiv:1601.01447 [pdf, other]
Title: State-Of-The-Art In Empirical Validation Of Software Metrics For Fault Proneness Prediction: Systematic Review
Bassey Isong, Obeten Ekabua
Subjects: Software Engineering (cs.SE)
[249] arXiv:1601.01453 [pdf, other]
Title: Green 5G Heterogeneous Networks through Dynamic Small-Cell Operation
Shijie Cai, Yueling Che, Lingjie Duan, Jing Wang, Shidong Zhou, Rui Zhang
Comments: The longer version of a paper to appear in IEEE Journal on Selected Areas in Communications, green communications and networking series
Subjects: Information Theory (cs.IT)
[250] arXiv:1601.01461 [pdf, other]
Title: Conditions on optimal support recovery in unmixing problems by means of multi-penalty regularization
Markus Grasmair, Valeriya Naumova
Subjects: Numerical Analysis (math.NA); Optimization and Control (math.OC)
Total of 1601 entries : 1-50 51-100 101-150 151-200 201-250 251-300 301-350 351-400 ... 1601-1601
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack