We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computer Science

Authors and titles for Jan 2015, skipping first 250

[ total of 1305 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | ... | 1301-1305 ]
[ showing 25 entries per page: fewer | more | all ]
[251]  arXiv:1501.01755 [pdf, ps, other]
Title: Minimization of image watermarking side effects through subjective optimization
Comments: 17 pages,11 figures, IET Image Processing Journal
Journal-ref: IET Image Processing, vol. 7, no. 8, pp. 733-741, 2013
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[252]  arXiv:1501.01758 [pdf, ps, other]
Title: Enhance Robustness of Image-in-Image Watermarking through Data Partitioning
Comments: 5 pages, 7 figures, IEEE TENCON2012
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[253]  arXiv:1501.01773 [pdf, ps, other]
Title: Estimates for the growth of inverse determinant sums of quasi-orthogonal and number field lattices
Comments: This is an extended and corrected version of R. Vehkalahti and L. Luzzi,"Measuring the growth of inverse determinants sums of a family of quasi-orthogonal codes", which appeared in proc. IZS 2014
Subjects: Information Theory (cs.IT); Number Theory (math.NT)
[254]  arXiv:1501.01779 [pdf, other]
Title: Reviving the Two-state Markov Chain Approach (Technical Report)
Comments: 25 pages, 2 figures
Subjects: Computational Engineering, Finance, and Science (cs.CE); Logic in Computer Science (cs.LO)
[255]  arXiv:1501.01780 [pdf, ps, other]
Title: Evidential Communities for Complex Networks
Authors: Kuang Zhou (IRISA), Arnaud Martin (IRISA), Quan Pan
Journal-ref: 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Jul 2014, Montpellier, France. pp.557 - 566
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[256]  arXiv:1501.01783 [pdf, other]
Title: Upper and Lower Bounds for Competitive Online Routing on Delaunay Triangulations
Subjects: Computational Geometry (cs.CG); Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS)
[257]  arXiv:1501.01792 [pdf, other]
Title: Frequency Selective Compressed Sensing
Comments: ieee notice page + 4 pages + references page, 7 figures, submitted to IEEE Signal Processing Letters
Subjects: Information Theory (cs.IT)
[258]  arXiv:1501.01797 [pdf, other]
Title: Inference for Generalized Linear Models via Alternating Directions and Bethe Free Energy Minimization
Subjects: Information Theory (cs.IT)
[259]  arXiv:1501.01809 [pdf, other]
Title: Firedrake: automating the finite element method by composing abstractions
Comments: Minor revisions to v2
Journal-ref: ACM Transactions on Mathematical Software 43(3):24:1--24:27 (2016)
Subjects: Mathematical Software (cs.MS); Numerical Analysis (math.NA)
[260]  arXiv:1501.01817 [pdf, ps, other]
Title: The Hunt for a Red Spider: Conjunctive Query Determinacy Is Undecidable
Subjects: Databases (cs.DB)
[261]  arXiv:1501.01819 [src]
Title: New algorithms for $k$-degenerate graphs
Comments: there are errors in the proofs
Subjects: Discrete Mathematics (cs.DM)
[262]  arXiv:1501.01822 [pdf, other]
Title: Central Trajectories
Comments: Full version
Subjects: Computational Geometry (cs.CG)
[263]  arXiv:1501.01825 [pdf, other]
Title: Unified Convex Optimization Approach to Super-Resolution Based on Localized Kernels
Subjects: Information Theory (cs.IT)
[264]  arXiv:1501.01826 [src]
Title: Designing Securely and Reliably Connected Wireless Sensor Networks
Comments: A critical error is found in the paper
Subjects: Cryptography and Security (cs.CR); Discrete Mathematics (cs.DM); Information Theory (cs.IT)
[265]  arXiv:1501.01829 [pdf, ps, other]
Title: Performance Analysis and Optimal Filter Design for Sigma-Delta Modulation via Duality with DPCM
Subjects: Information Theory (cs.IT)
[266]  arXiv:1501.01858 [pdf, ps, other]
Title: Optimization of Energy Harvesting MISO Communication System with Feedback
Comments: 11 pages
Subjects: Information Theory (cs.IT)
[267]  arXiv:1501.01862 [pdf, ps, other]
Title: Time Reversal-based Transmissions with Distributed Power Allocation for Two-Tier Networks
Comments: 6 pages, 3 figures
Subjects: Information Theory (cs.IT)
[268]  arXiv:1501.01864 [pdf, ps, other]
Title: Transmit Beamforming for MISO Broadcast Channels with Statistical and Delayed CSIT
Comments: Accepted to IEEE Transaction on Communications
Subjects: Information Theory (cs.IT)
[269]  arXiv:1501.01866 [pdf, other]
Title: The Hebrew Bible as Data: Laboratory - Sharing - Experiences
Authors: Dirk Roorda
Comments: 12 pages, 5 figures, follow up on the workshop Biblical Scholarship and Humanities Computing: Data Types, Text, Language and Interpretation, held at the Lorentz Centre Leiden from 6 Feb 2012 through 10 Feb 2012, this http URL&venue=Oort
Subjects: Computation and Language (cs.CL); Digital Libraries (cs.DL)
[270]  arXiv:1501.01868 [pdf, ps, other]
Title: Performance Analysis Of Resource Scheduling In LTE Femtocells Networks
Comments: 11 pages, 9 figures, 3 tables, The Sixth International Conference on Networks & Communications (NETCOM - 2014)
Subjects: Networking and Internet Architecture (cs.NI)
[271]  arXiv:1501.01875 [pdf, ps, other]
Title: A study of the interface usability issues of mobile learning applications for smart phones from the users perspective
Comments: 16 pages, 7 figures, 5 tables, and 31 conferences. in International Journal on Integrating Technology in Education (IJITE) Vol.3, No.4, December 2014
Subjects: Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[272]  arXiv:1501.01894 [pdf, ps, other]
Title: Quantifying Scripts: Defining metrics of characters for quantitative and descriptive analysis
Authors: Vinodh Rajan
Comments: Manuscript submitted to Literary and Linguistic Computing Journal
Subjects: Computation and Language (cs.CL)
[273]  arXiv:1501.01901 [pdf, ps, other]
Title: Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification
Comments: 16 pages, 6 Figures in International Conference of Security, Privacy and Trust Management 2014
Subjects: Cryptography and Security (cs.CR)
[274]  arXiv:1501.01903 [pdf, ps, other]
Title: Interests Diffusion in Social Networks
Comments: 30 pages 13 figs 4 tables
Subjects: Computers and Society (cs.CY); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[275]  arXiv:1501.01905 [pdf, ps, other]
Title: SHM method for damage localization based on substructuring and VARX models
Subjects: Systems and Control (eess.SY)
[ total of 1305 entries: 1-25 | ... | 176-200 | 201-225 | 226-250 | 251-275 | 276-300 | 301-325 | 326-350 | ... | 1301-1305 ]
[ showing 25 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2405, contact, help  (Access key information)