


default search action
CoRR, September 2004
- Alexandre O. Stauffer, Valmir Carneiro Barbosa:
Probabilistic heuristics for disseminating information in networks. - Pascal Hitzler:
Default reasoning over domains and concept hierarchies. - Parth Bhawalkar, Victor Bigio, Adam Davis, Karthik Narayanaswami, Femi Olumoko:
ScheduleNanny: Using GPS to Learn the User's Significant Locations Travel Times and Schedule. - Manoj Kumar:
The Password Change Phase is Still Insecure. - Adam J. Slagell, William Yurcik:
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. - Dumitru N. Vulcanov, Valentina D. Vulcanov:
Maple+GrTensorII libraries for cosmology. - Jean Dezert, Florentin Smarandache, Milan Daniel:
The Generalized Pignistic Transformation. - Lea Cyrus, Hendrik Feddes:
A Model for Fine-Grained Alignment of Multilingual Texts. - Dirk Beyer, Andreas Noack:
CrocoPat 2.1 Introduction and Reference Manual. - Alexander Barg, Gilles Zémor:
Distance properties of expander codes. - G. David Forney Jr.:
Shannon meets Wiener II: On MMSE estimation in successive decoding schemes. - Elitza N. Maneva, Elchanan Mossel, Martin J. Wainwright:
A New Look at Survey Propagation and its Generalizations. - Ching-Chi Lin, Gerard J. Chang, Gen-Huey Chen:
Locally connected spanning trees on graphs. - Manoj Kumar:
A Digital Signature with Threshold Generation and Verification. - Stephen A. Cook, Neil Thapen:
The strength of replacement in weak arithmetic. - V. S. Lugovsky:
Using a hierarchy of Domain Specific Languages in complex software systems design. - Jianyang Zeng, Wen-Jing Hsu, Yahong Hu:
Looking Further Ahead Reveals An Even Smaller World. - Adam J. Slagell, Rafael Bonilla:
PKI Scalability Issues. - Fabrizio Angiulli, Gianluigi Greco, Luigi Palopoli:
Outlier Detection by Logic Programming. - Haibin Wang, Yuanchun He, Rajshekhar Sunderraman:
A Generalized Disjunctive Paraconsistent Data Model for Negative and Disjunctive Information. - Vita Hinze-Hoare:
Should Cyberspace Chat Rooms be closed to protect Children? - Ian Frommer, Eric J. Harder, Brian R. Hunt, Ryan Lance, Edward Ott, James A. Yorke:
Two Models for the Study of Congested Internet Connections. - Brendan Lucier:
Construction of a Function Using a Fibonacci Numeration System. - Leonid A. Levin:
Aperiodic Tilings: Breaking Translational Symmetry. - Serban E. Vlad:
Topics in asynchronous systems. - Henry D. Pfister, Igal Sason, Rüdiger L. Urbanke:
Capacity-achieving ensembles for the binary erasure channel with bounded complexity. - Henry D. Pfister, Igal Sason, Rüdiger L. Urbanke:
Bounds on the decoding complexity of punctured codes on graphs. - Andreas U. Schmidt:
On Incentive Systems Based on Multi-Level Marketing of Virtual Goods. - Jacques Dubrois, Jean-Guillaume Dumas:
Efficient polynomial time algorithms computing industrial-strength primitive roots. - Slim Abdennadher, Christophe Rigotti:
Automatic Generation of CHR Constraint Solvers. - Patrick C. McGuire, Javier Gómez-Elvira, José Antonio Rodríguez Manfredi, Eduardo Sebastián-Martínez, Jens Ormö, Enrique Díaz Martínez, Helge J. Ritter, Markus Oesker, Robert Haschke, Jörg Ontrup:
Field Geology with a Wearable Computer: First Results of the Cyborg Astrobiologist System. - A. K. Kolakowska, Mark A. Novotny:
Desynchronization and Speedup in an Asynchronous Conservative Parallel Update Protocol. - Tomasz Suslo:
Mean and variance estimation by kriging. - Paul Stanton:
Securing Data in Storage: A Review of Current Research. - Ning Lu, Z. Todd Taylor, David P. Chassin, Ross T. Guttromson, R. Scott Studham:
Parallel Computing Environments and Methods for Power Distribution System Simulation. - Sunder Lal, Manoj Kumar:
A Directed Signature Scheme and its Applications. - Mark Dumay:
Business Processes: The Theoretical Impact of Process Thinking on Information Systems Development. - Maria J. García de la Banda, Warwick Harvey, Kim Marriott, Peter J. Stuckey, Bart Demoen:
Checking modes of HAL programs. - Marius Ionescu:
P is not NP. - Florentin Smarandache:
Unification of Fusion Theories. - Vita Hinze-Hoare:
Four Principles Fundamental to Design Practice for Human Centred Systems. - Harry Fitié:
A new architecture for making highly scalable applications. - Luca Trevisan:
Inapproximability of Combinatorial Optimization Problems. - Luca Trevisan:
Some Applications of Coding Theory in Computational Complexity. - Amar Isli:
Augmenting ALC(D) (atemporal) roles and (aspatial) concrete domain with temporal roles and a spatial concrete domain -first results. - Amar Isli:
A TCSP-like decidable constraint language generalising existing cardinal direction relations. - Amar Isli:
An ALC(D)-based combination of temporal constraints and spatial constraints suitable for continuous (spatial) change. - Michael M. Tung:
FORM Matters: Fast Symbolic Computation under UNIX. - Manoj Kumar:
A Directed -Threshold Multi-Signature Scheme. - Sunder Lal, Manoj Kumar:
Some Applications of Directed Signature Scheme. - Tereza Tusarová:
Quantum Complexity Classes. - Parosh Aziz Abdulla, Aletta Nylén:
Better Quasi-Ordered Transition Systems. - G. David Forney Jr.:
On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener. - Sébastien Roch, Patrice Marcotte, Gilles Savard:
An Approximation Algorithm for Stackelberg Network Pricing. - Alpay Beler, Ann Borda, Jonathan P. Bowen, Silvia Filippini-Fantoni:
The Building of Online Communities: An approach for learning organizations, with a particular focus on the museum sector. - Gianluca Argentini:
Using sparse matrices and splines-based interpolation in computational fluid dynamics simulations. - Sariel Har-Peled, Manor Mendel:
Fast Construction of Nets in Low Dimensional Metrics, and Their Applications. - Bo Pang, Lillian Lee:
A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based on Minimum Cuts. - Vita Hinze-Hoare:
From Digital Television to Internet? - Anton Bovier, Irina A. Kurkova:
Poisson convergence in the restricted k-partioning problem. - Camille Roth, Paul Bourgine:
Epistemic communities: description and hierarchic categorization. - Konstantin Klemm, Stefan Bornholdt:
Topology of biological networks and reliability of information processing.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.