06-25-2019
|
Requirements and Recommendations for IoT/IIoT Models to
automate Security Assurance through Threat Modelling,
Security Analysis and Penetration Testing
by
Ralph Ankele
et al
|
|
|
|
06-25-2019
|
From Non-Paying to Premium: Predicting User Conversion
in Video Games with Ensemble Learning
by
Anna Guitart
et al
|
|
|
|
06-25-2019
|
Riemannian optimization on the simplex of positive
definite matrices
by
Bamdev Mishra
et al
|
|
|
|
06-25-2019
|
Non-Asymptotic Pure Exploration by Solving Games
by
Rémy Degenne
et al
|
|
|
|
06-27-2019
|
Further Results on Stability-Preserving Mechanisms for
School Choice
by
Karthik Gajulapalli
et al
|
|
|
|
06-26-2019
|
Monte Carlo Integration with adaptive variance
selection for improved stochastic Efficient Global
Optimization
by
Felipe Carraro
et al
|
|
|
|
06-25-2019
|
Restless dependent bandits with fading memory
by
Oleksandr Zadorozhnyi
et al
|
|
|
|
06-25-2019
|
A unified sparse optimization framework to learn
parsimonious physics-informed models from data
by
Kathleen Champion
et al
|
|
|
|
06-25-2019
|
An Unsupervised Bayesian Neural Network for Truth
Discovery
by
Jielong Yang
et al
|
|
|
|
06-27-2019
|
A PolSAR Scattering Power Factorization Framework and
Novel Roll-Invariant Parameters Based Unsupervised
Classification Scheme Using a Geodesic Distance
by
Debanshu Ratha
et al
|
|
|
|
06-25-2019
|
Partial Quantifier Elimination With Learning
by
Eugene Goldberg
|
|
|
|
06-25-2019
|
Molecular Property Prediction: A Multilevel Quantum
Interactions Modeling Perspective
by
Chengqiang Lu
et al
|
|
|
|
06-26-2019
|
4K-Memristor Analog-Grade Passive Crossbar Circuit
by
Hyungjin Kim
et al
|
|
|
|
06-28-2019
|
MGOS: A Library for Molecular Geometry and its
Operating System
by
Deok-Soo Kima
et al
|
|
|
|
06-27-2019
|
Findings of the First Shared Task on Machine
Translation Robustness
by
Xian Li
et al
|
|
|
|
06-27-2019
|
Packing Boundary-Anchored Rectangles and Squares
by
Therese Biedl
et al
|
|
|
|
06-27-2019
|
Critical Edge Identification: A K-Truss Based Model
by
Wenjie Zhu
et al
|
|
|
|
06-28-2019
|
Localizing Unseen Activities in Video via Image Query
by
Zhu Zhang
et al
|
|
|
|
06-25-2019
|
The Aw-Rascle traffic model: Enskog-type kinetic
derivation and generalisations
by
Giacomo Dimarco
et al
|
|
|
|
06-27-2019
|
To Act or React: Investigating Proactive Strategies For
Online Community Moderation
by
Hussam Habib
et al
|
|
|
|
06-27-2019
|
Comparing Semi-Parametric Model Learning Algorithms for
Dynamic Model Estimation in Robotics
by
Sebastian Riedel
et al
|
|
|
|
06-27-2019
|
The Weighted Sitting Closer to Friends than Enemies
Problem in the Line
by
Julio Aracena
et al
|
|
|
|
06-26-2019
|
Deception Strategies and Threats for Online Discussions
by
Onur Varol
et al
|
|
|
|
06-26-2019
|
Convergence of Milstein Brownian bridge Monte Carlo
methods and stable Greeks calculation
by
Thomas Gerstner
et al
|
|
|
|
06-25-2019
|
A Winograd-based Integrated Photonics Accelerator for
Convolutional Neural Networks
by
Armin Mehrabian
et al
|
|
|
|
06-26-2019
|
An Explicit Mapped Tent Pitching Scheme for Maxwell
Equations
by
Jay Gopalakrishnan
et al
|
|
|
|
06-25-2019
|
Anti-Latinx Computational Propaganda in the United
States
by
Claudia Flores-Saviaga
et al
|
|
|
|
06-28-2019
|
An Energy Stable BDF2 Fourier Pseudo-Spectral Numerical
Scheme for the Square Phase Field Crystal Equation
by
Kelong Cheng
et al
|
|
|
|
06-28-2019
|
Towards Assigning Priorities in Queues Using Age of
Information
by
Jin Xu
et al
|
|
|
|
06-26-2019
|
Q-Learning Inspired Self-Tuning for Energy Efficiency
in HPC
by
Andreas Gocht
et al
|
|
|
|
06-28-2019
|
L*-Based Learning of Markov Decision Processes
(Extended Version)
by
Martin Tappler
et al
|
|
|
|
06-26-2019
|
Visual Anomaly Detection in Event Sequence Data
by
Shunan Guo
et al
|
|
|
|
06-26-2019
|
Approximating the pth Root by Composite Rational
Functions
by
Evan S. Gawlik
et al
|
|
|
|
06-25-2019
|
Traffic Flow Combination Forecasting Method Based on
Improved LSTM and ARIMA
by
Boyi Liu
et al
|
|
|
|
06-26-2019
|
What concerns do Chinese parents have about their
childrens digital adoption and how to better support
them?
by
Ge Wang
et al
|
|
|
|
06-25-2019
|
A High-Order Lower-Triangular Pseudo-Mass Matrix for
Explicit Time Advancement of hp Triangular Finite
Element Methods
by
Jay Appleton
et al
|
|
|
|
06-25-2019
|
A novel music-based game with motion capture to support
cognitive and motor function in the elderly
by
Kat Agres
et al
|
|
|
|
06-26-2019
|
Water Preservation in Soan River Basin using Deep
Learning Techniques
by
Sadaqat ur Rehman
et al
|
|
|
|
06-25-2019
|
Uniform error bounds of time-splitting methods for the
nonlinear Dirac equation in the nonrelativistic limit
regime
by
Weizhu Bao
et al
|
|
|
|
06-25-2019
|
Explaining Deep Learning Models with Constrained
Adversarial Examples
by
Jonathan Moore
et al
|
|
|
|
06-27-2019
|
Gaussian Regularization of the Pseudospectrum and
Davies Conjecture
by
Jess Banks
et al
|
|
|
|
06-25-2019
|
ReachNN: Reachability Analysis of Neural-Network
Controlled Systems
by
Chao Huang
et al
|
|
|
|
06-27-2019
|
Adaptive second-order Crank-Nicolson time-stepping
schemes for time fractional molecular beam epitaxial
growth models
by
Bingquan Ji
et al
|
|
|
|
06-27-2019
|
Array Codes with Local Properties
by
Mario Blaum
et al
|
|
|
|
06-27-2019
|
On nested and 2-nested graphs: two subclasses of graphs
between threshold and split graphs
by
Nina Pardal
et al
|
|
|
|
06-25-2019
|
A Compact, Logical Approach to Large-Market Analysis
by
Yannai A. Gonczarowski
et al
|
|
|
|
06-25-2019
|
Polyhedral Spline Finite Elements
by
Guohui Zhao
|
|
|
|
06-27-2019
|
Convergence rates for the numerical approximation of
the 2D stochastic Navier-Stokes equations
by
Dominic Breit
et al
|
|
|
|
06-26-2019
|
A registration method for model order reduction: data
compression and geometry reduction
by
Tommaso Taddei
|
|
|
|
06-28-2019
|
Can Marton Coding Alone Ensure Individual Secrecy?
by
Jin Yeong Tan
et al
|
|
|
|
06-28-2019
|
Detection of time-varying heat sources using an
analytic forward model
by
Janne P. Tamminen
|
|
|
|
06-25-2019
|
Convergence analysis and parity conservation of a new
form of a quadratic explicit spline
by
A. J. Ferrari
et al
|
|
|
|
06-28-2019
|
Implementing Ethics in AI: An industrial multiple case
study
by
Ville Vakkuri
et al
|
|
|
|
06-28-2019
|
Singular integration towards a spectrally accurate
finite difference operator
by
Andre Nachbin
|
|
|
|
06-26-2019
|
EdgeLens: Deep Learning based Object Detection in
Integrated IoT, Fog and Cloud Computing Environments
by
Shreshth Tuli
et al
|
|
|
|
06-26-2019
|
Private Information Retrieval with Private Coded Side
Information: The Multi-Server Case
by
Fatemeh Kazemi
et al
|
|
|
|
06-27-2019
|
Accelerated Symmetric ADMM and Its Applications in
Signal Processing
by
Jianchao Bai
et al
|
|
|
|
06-28-2019
|
Learning Arbitration for Shared Autonomy by Hindsight
Data Aggregation
by
Yoojin Oh
et al
|
|
|
|
06-28-2019
|
Numerical method for scattering problems in periodic
waveguides
by
Ruming Zhang
|
|
|
|
06-27-2019
|
Multivariate Big Data Analysis for Intrusion Detection:
5 steps from the haystack to the needle
by
José Camacho
et al
|
|
|
|
06-26-2019
|
The impatient collector
by
Anis Amri
et al
|
|
|
|
06-26-2019
|
Using the Agile software development lifecycle to
develop a standalone application for generating colour
magnitude diagrams
by
K. Fitzgerald
et al
|
|
|
|
06-27-2019
|
Robotic Supervised Autonomy: A Review
by
Yangming Li
|
|
|
|
06-28-2019
|
Access Balancing in Storage Systems by Labeling Partial
Steiner Systems
by
Yeow Meng Chee
et al
|
|
|
|
06-28-2019
|
Non-user Inclusive Design for Maintaining Harmony of
Real-Virtual Human Interaction in Augmented Reality
by
Chao Shi
|
|
|
|
06-28-2019
|
Variance reduction for effective energies of random
lattices in the Thomas-Fermi-von Weizs\acker model
by
Julian Fischer
et al
|
|
|
|
06-27-2019
|
BTEL: A Binary Tree Encoding Approach for Visual
Localization
by
Huu Le
et al
|
|
|
|
06-27-2019
|
Privacy-Preserving Distributed Learning with Secret
Gradient Descent
by
Valentin Hartmann
et al
|
|
|
|
06-26-2019
|
Incentive Mechanisms to Prevent Efficiency Loss of
Non-Profit Utilities
by
Carlos Barreto
et al
|
|
|
|
06-28-2019
|
A Taxonomy for Virtual and Augmented Reality in
Education
by
Jiri Motejlek
et al
|
|
|
|
06-25-2019
|
h- and p-refined Multilevel Monte Carlo Methods for
Uncertainty Quantification in Structural Engineering
by
Philippe Blondeel
et al
|
|
|
|
06-27-2019
|
Representation Learning of Music Using Artist, Album,
and Track Information
by
Jongpil Lee
et al
|
|
|
|
06-27-2019
|
Adaptive First-Order System Least-Squares Finite
Element Methods for Second Order Elliptic Equations in
Non-Divergence Form
by
Weifeng Qiu
et al
|
|
|
|
06-26-2019
|
Toward Maximum Grip Process Modeling in Software
Engineering
by
Sabah Al-Fedaghi
|
|
|
|
06-27-2019
|
Pruned Landmark Labeling Meets Vertex Centric
Computation: A Surprisingly Happy Marriage!
by
Ruoming Jin
et al
|
|
|
|
06-27-2019
|
Binary optimal linear codes from posets of the disjoint
union of two chains
by
Yansheng Wu
et al
|
|
|
|
06-27-2019
|
Traffic Management Strategies for Multi-Robotic Rigid
Payload Transport Systems
by
Yahnit Sirineni
et al
|
|
|
|
06-28-2019
|
Safeguarding the Evidential Value of Forensic
Cryptocurrency Investigations
by
Michael Fröwis
et al
|
|
|
|
06-28-2019
|
Computing Haar Measures
by
Arno Pauly
et al
|
|
|
|
06-26-2019
|
Branched splines
by
Guohui Zhao
|
|
|
|
06-25-2019
|
Bilinear Compressed Sensing under known Signs via
Convex Programming
by
Alireza Aghasi
et al
|
|
|
|
06-25-2019
|
Pyramid: A General Framework for Distributed Similarity
Search
by
Shiyuan Deng
et al
|
|
|
|
06-25-2019
|
On the Upload versus Download Cost for Secure and
Private Matrix Multiplication
by
Wei-Ting Chang
et al
|
|
|
|
06-25-2019
|
On a K_2,3 in non-Hamiltonian graphs
by
Heping Jiang
|
|
|
|
06-25-2019
|
Discrete logarithms in quasi-polynomial time in finite
fields of fixed characteristic
by
Thorsten Kleinjung
et al
|
|
|
|
06-25-2019
|
Advances in Implementation, Theoretical Motivation, and
Numerical Results for the Nested Iteration with Range
Decomposition Algorithm
by
Wayne Mitchell
et al
|
|
|
|
06-27-2019
|
PRNU Based Source Camera Attribution for Image Sets
Anonymized with Patch-Match Algorithm
by
Ahmet Karaküçük
et al
|
|
|
|
06-26-2019
|
Stochastic hybrid differential games and match race
problems
by
Simone Cacace
et al
|
|
|
|
06-26-2019
|
A numerical scheme for stochastic differential
equations with distributional drift
by
Tiziano De Angelis
et al
|
|
|
|
06-27-2019
|
A Survey and Experimental Analysis of Distributed
Subgraph Matching
by
Longbin Lai
et al
|
|
|
|
06-27-2019
|
Deception, Delay, and Detection of Strategies
by
Michael Erdmann
|
|
|
|
06-28-2019
|
Throughput Scaling of Covert Communication over
Wireless Adhoc Networks
by
Kang-Hee Cho
et al
|
|
|
|
06-25-2019
|
Counting Roots of a Polynomial in a Convex Compact
Region by Means of Winding Number Calculation via
Sampling
by
Vitaly Zaderman
et al
|
|
|
|
06-25-2019
|
Wise Data: A Novel Approach in Data Science from a
Network Science Perspective
by
Mike Raeini
|
|
|
|
06-27-2019
|
Capacity and Coverage Enhancement Using Long-Endurance
Tethered Airborne Base Stations
by
Mustafa A. Kishk
et al
|
|
|
|
06-28-2019
|
SeF: A Secure Fountain Architecture for Slashing
Storage Costs in Blockchains
by
Swanand Kadhe
et al
|
|
|
|
06-27-2019
|
Datasets for Face and Object Detection in Fisheye
Images
by
Jianglin Fu
et al
|
|
|
|
06-28-2019
|
High Speed Cognitive Domain Ontologies for Asset
Allocation Using Loihi Spiking Neurons
by
Chris Yakopcic
et al
|
|
|
|
06-28-2019
|
Quantitative OCT reconstructions for dispersive media
by
Peter Elbau
et al
|
|
|
|
06-26-2019
|
Combining Stochastic Adaptive Cubic Regularization with
Negative Curvature for Nonconvex Optimization
by
Seonho Park
et al
|
|
|
|
06-28-2019
|
Inversion of trace formulas for a Sturm-Liouville
operator
by
Xiang Xu
et al
|
|
|
|
06-25-2019
|
Non-Parallel Sequence-to-Sequence Voice Conversion with
Disentangled Linguistic and Speaker Representations
by
Jing-Xuan Zhang
et al
|
|
|
|
06-25-2019
|
A hierarchical approach to the a posteriori error
estimation of isogeometric Kirchhoff plates and
Kirchhoff-Love shells
by
Pablo Antolin
et al
|
|
|
|
06-26-2019
|
Detection of small changes in medical and random-dot
images comparing self-organizing map performance to
human detection
by
John Wandeto
et al
|
|
|
|
06-26-2019
|
(Theta, triangle)-free and (even hole, K4K4)-free
graphs. Part 1 : Layered wheels
by
Ni Luh Dewi Sintiari
et al
|
|
|
|
06-25-2019
|
Stabilization of infinite-dimensional linear control
systems by POD reduced-order Riccati feedback
by
Emmanuel Trélat
et al
|
|
|
|
06-26-2019
|
Non-malleable Coding for Arbitrary Varying Channels
by
Fuchun Lin
et al
|
|
|
|
06-25-2019
|
Orthogonal polynomials in and on a quadratic surface of
revolution
by
Sheehan Olver
et al
|
|
|
|
06-27-2019
|
Separation between Second Price Auctions with
Personalized Reserves and the Revenue Optimal Auction
by
Will Ma
et al
|
|
|
|
06-26-2019
|
Gray Level Image Threshold Using Neutrosophic Shannon
Entropy
by
Vasile Patrascu
|
|
|
|
06-26-2019
|
A decoupled staggered scheme for the shallow water
equations
by
Raphaèle Herbin
et al
|
|
|
|
06-25-2019
|
Hybrid coupling of CG and HDG discretizations based on
Nitsches method
by
Andrea La Spina
et al
|
|
|
|
06-25-2019
|
RoadTrack: Tracking Road Agents in Dense and
Heterogeneous Environments
by
Rohan Chandra
et al
|
|
|
|
06-26-2019
|
On the Energy Efficiency of Limited-Backhaul Cell-Free
Massive MIMO
by
Manijeh Bashar
et al
|
|
|
|
06-27-2019
|
Homography from two orientation- and scale-covariant
features
by
Daniel Barath
et al
|
|
|
|
06-26-2019
|
Secure Client and Server Geolocation Over the Internet
by
AbdelRahman Abdou
et al
|
|
|
|
06-28-2019
|
Engineering study on the use of Head-Mounted display
for Brain- Computer Interface
by
Anton Andreev
et al
|
|
|
|
06-26-2019
|
On the Common Randomness Capacity of a Special Class of
Two-way Channels
by
Saeed Hajizadeh
|
|
|
|
06-28-2019
|
Background Subtraction using Adaptive Singular Value
Decomposition
by
Günther Reitberger
et al
|
|
|
|
06-25-2019
|
Communication Through a Large Reflecting Surface With
Phase Errors
by
Mihai-Alin Badiu
et al
|
|
|
|
06-28-2019
|
Stable Matchings in Divorce Graphs
by
Jiehua Chen
|
|
|
|
06-28-2019
|
Motion Prediction with Recurrent Neural Network
Dynamical Models and Trajectory Optimization
by
Philipp Kratzer
et al
|
|
|
|
06-25-2019
|
Spectral Properties of Radial Kernels and Clustering in
High Dimensions
by
David Cohen-Steiner
et al
|
|
|
|
06-27-2019
|
Multi-Robot Patrolling with Sensing Idleness and Data
Delay Objectives
by
Jürgen Scherer
et al
|
|
|
|
06-26-2019
|
Stepping OCaml
by
Tsukino Furukawa
et al
|
|
|
|
06-25-2019
|
Hybrid Resource Scheduling for Aggregation in Massive
Machine-type Communication Networks
by
Onel L. Alcaraz López
et al
|
|
|
|
06-27-2019
|
Evaluation of Abramowitz functions in the right half of
the complex plane
by
Zydrunas Gimbutas
et al
|
|
|
|
06-25-2019
|
The Complexity of Black-Box Mechanism Design with
Priors
by
Evangelia Gergatsouli
et al
|
|
|
|
06-27-2019
|
Distributed Clustering in the Anonymized Space with
Local Differential Privacy
by
Lin Sun
et al
|
|
|
|
06-25-2019
|
Coding for Crowdsourced Classification with XOR Queries
by
James
et al
|
|
|
|
06-25-2019
|
Dynamic Programming Method for Best Piecewise Linear
Approximation for Vector Field of Nonlinear Boundary
Value Problems on the Interval [0, 1]
by
Duggirala Meher Krishna
et al
|
|
|
|
06-27-2019
|
[1,2]-Domination in Generalized Petersen Graphs
by
Fairouz Beggas
et al
|
|
|
|
06-27-2019
|
Flexible Anonymous Network
by
Florentin Rochet
et al
|
|
|
|
06-27-2019
|
Simple maximum-principle preserving time-stepping
methods for time-fractional Allen-Cahn equation
by
Bingquan Ji
et al
|
|
|
|
06-27-2019
|
On the Sparseness of Certain MRD Codes
by
Heide Gluesing-Luerssen
|
|
|
|
06-25-2019
|
Asymptotic growth rate of square grids dominating sets:
a symbolic dynamics approach
by
Silvère Gangloff
et al
|
|
|
|
06-25-2019
|
Towards the Tunka-Rex Virtual Observatory
by
P. Bezyazeekov
et al
|
|
|
|
06-25-2019
|
ETTR Bounds and Approximation Solutions of Blind
Rendezvous Policies in Cognitive Radio Networks with
Random Channel States
by
Cheng-Shang Chang
et al
|
|
|
|
06-26-2019
|
A New Look at Cell-Free Massive MIMO: Making It
Practical With Dynamic Cooperation
by
Emil Björnson
et al
|
|
|
|
06-26-2019
|
Guessing Individual Sequences: Generating Randomized
Guesses Using Finite-State Machines
by
Neri Merhav
|
|
|
|
06-27-2019
|
More chemical detection through less sampling:
amplifying chemical signals in hyperspectral data cubes
through compressive sensing
by
Henry Kvinge
et al
|
|
|
|
06-25-2019
|
On The Dimension of The Subfield Subcodes of 1-Point
Hermitian Codes
by
Sabira El Khalfaoui
et al
|
|
|
|
06-25-2019
|
Emotion Recognition Using Fusion of Audio and Video
Features
by
Juan D. S. Ortega
et al
|
|
|
|
06-25-2019
|
Tone-index Multisine Modulation for SWIPT
by
Ioannis Krikidis
et al
|
|
|
|
06-25-2019
|
Probabilistic Error Analysis for Inner Products
by
Ilse C. F. Ipsen
et al
|
|
|
|
06-26-2019
|
An Algorithm for Transmitting VR Video Based on
Adaptive Modulation
by
Jie Feng
et al
|
|
|
|
06-26-2019
|
BioGen: Automated Biography Generation
by
Heer Ambavi
et al
|
|
|
|
06-27-2019
|
An Empirical Study of Information Flows in Real-World
JavaScript
by
Cristian-Alexandru Staicu
et al
|
|
|
|
06-26-2019
|
Network Slicing Management Technique for Local 5G
Micro-Operator Deployments
by
Idris Badmus
et al
|
|
|
|
06-27-2019
|
Automatic Detection of Myocontrol Failures Based upon
Situational Context Information
by
Karoline Heiwolt
et al
|
|
|
|
06-25-2019
|
Investigating the OPS intermediate representation to
target GPUs in the Devito DSL
by
Vincenzo Pandolfo
|
|
|
|
06-25-2019
|
A Permit-Based Optimistic Byzantine Ledger
by
Roland Schmid
et al
|
|
|
|
06-26-2019
|
Security Update Labels: Establishing Economic
Incentives for Security Patching of IoT Consumer
Products
by
Philipp Morgner
et al
|
|
|
|
06-27-2019
|
A Key 6G Challenge and Opportunity -- Connecting the
Remaining 4 Billions: A Survey on Rural Connectivity
by
Elias Yaacoub
et al
|
|
|
|
06-27-2019
|
Mixed-Signal Charge-Domain Acceleration of Deep Neural
networks through Interleaved Bit-Partitioned Arithmetic
by
Soroush Ghodrati
et al
|
|
|
|
06-28-2019
|
Online Quantitative Timed Pattern Matching with
Semiring-Valued Weighted Automata
by
Masaki Waga
|
|
|
|
06-27-2019
|
Good for Games Automata: From Nondeterminism to
Alternation
by
Udi Boker
et al
|
|
|
|
06-25-2019
|
New Pumping Technique for 2-dimensional VASS
by
Wojciech Czerwiński
et al
|
|
|
|
06-26-2019
|
Structural Contracts -- Contracts for Type Construction
& Dependent Types to Ensure Consistency of
Extra-Functional Reasoning
by
Gregor Nitsche
|
|
|
|
06-25-2019
|
Technical Health Check For Cloud Service Providers
by
Muhammed Fatih Bulut
et al
|
|
|
|
06-28-2019
|
A linear method for camera pair self-calibration and
multi-view reconstruction with geometrically verified
correspondences
by
Nikos Melanitis
et al
|
|
|
|
06-26-2019
|
Challenges for Security Assessment of Enterprises in
the IoT Era
by
Yael Mathov
et al
|
|
|
|
06-28-2019
|
Bidirectional Type Class Instances (Extended Version)
by
Koen Pauwels
et al
|
|
|
|
06-27-2019
|
Remark on Algorithm 680: evaluation of the complex
error function: Cause and Remedy for the Loss of
Accuracy Near the Real Axis
by
Mofreh Zaghloul
|
|
|
|
06-25-2019
|
Keep soft robots soft -- a data-driven based trade-off
between feed-forward and feedback control
by
Thomas Beckers
et al
|
|
|
|
06-26-2019
|
FatPaths: Routing in Supercomputers, Data Centers, and
Clouds with Low-Diameter Networks when Shortest Paths
Fall Short
by
Maciej Besta
et al
|
|
|
|
06-28-2019
|
Analyzing GDPR Compliance Through the Lens of Privacy
Policy
by
Jayashree Mohan
et al
|
|
|
|
06-26-2019
|
A Modular and Extensible Software Architecture for
Particle Dynamics
by
Sebastian Eibl
et al
|
|
|
|
06-27-2019
|
A Sweet Recipe for Consolidated Vulnerabilities:
Attacking a Live Website by Harnessing a Killer
Combination of Vulnerabilities
by
Mazharul Islam
et al
|
|
|
|
06-27-2019
|
An Approach for Reviewing Security-Related Aspects in
Agile Requirements Specifications of Web Applications
by
H. Villamizar
et al
|
|
|
|
06-26-2019
|
Learning a Joint Embedding Space of Monophonic and
Mixed Music Signals for Singing Voice
by
Kyungyun Lee
et al
|
|
|
|
06-26-2019
|
Heuristic Approach Towards Countermeasure Selection
using Attack Graphs
by
Orly Stan
et al
|
|
|
|
06-26-2019
|
A High-Performance Implementation of a Robust
Preconditioner for Heterogeneous Problems
by
Linus Seelinger
et al
|
|
|
|
06-25-2019
|
Towards Enterprise-Ready AI Deployments Minimizing the
Risk of Consuming AI Models in Business Applications
by
Aleksander Slominski
et al
|
|
|
|
06-27-2019
|
Enhancing Python Compiler Error Messages via Stack
Overflow
by
Emillie Thiselton
et al
|
|
|
|
06-27-2019
|
Investigating Compilation Errors of Students Learning
Haskell
by
Boldizsár Németh
et al
|
|
|
|
06-26-2019
|
Fixed Rate Statistical QoS Provisioning for Markovian
Sources in Machine Type Communication
by
Fahad Qasmi
et al
|
|
|
|
06-25-2019
|
Enabling security and High Energy Efficiency in the
Internet of Things with Massive MIMO Hybrid Precoding
by
Ran Zi
et al
|
|
|
|
06-27-2019
|
Data Consortia
by
Eric Bax
et al
|
|
|
|
06-26-2019
|
Low-Complexity Equalization of MIMO-OSDM
by
Jing Han
et al
|
|
|
|
06-25-2019
|
Leader Election Requires Logarithmic Time in Population
Protocols
by
Yuichi Sudo
et al
|
|
|
|
06-25-2019
|
(Pseudo) Random Quantum States with Binary Phase
by
Zvika Brakerski
et al
|
|
|
|
06-27-2019
|
Modal-based Kinematics and Contact Detection of Soft
Robots
by
Yue Chen
et al
|
|
|
|
06-25-2019
|
Parallel Performance of Algebraic Multigrid Domain
Decomposition (AMG-DD)
by
Wayne Mitchell
et al
|
|
|
|
06-25-2019
|
Future of Computing is Boring (and that is exciting!)
or How to get to Computing Nirvana in 20 years or less
by
Aleksander Slominski
et al
|
|
|
|
06-26-2019
|
Software Engineering Research Community Viewpoints on
Rapid Reviews
by
Bruno Cartaxo
et al
|
|
|
|
06-28-2019
|
Robustness Against Transactional Causal Consistency
by
Sidi Mohamed Beillahi
et al
|
|
|
|
06-28-2019
|
Category-Theoretic Foundations of STCLang: State Thread
Composition as a Foundation for Monadic Dataflow
Parallelism
by
Sebastian Ertel
et al
|
|
|
|
06-27-2019
|
Raven: Open Surgical Robotic Platforms
by
Yangming Li
et al
|
|
|
|
06-26-2019
|
Improving the use of the randomized singular value
decomposition for the inversion of gravity and magnetic
data
by
Saeed Vatankhah
et al
|
|
|
|
06-28-2019
|
A DTLS Abstraction Layer for the Recursive Networking
Architecture in RIOT
by
M. Aiman Ismail
et al
|
|
|
|
06-28-2019
|
Utility-Preserving Privacy Mechanisms for Counting
Queries
by
Natasha Fernandes
et al
|
|
|
|
06-27-2019
|
What Do Developers Ask About ML Libraries? A
Large-scale Study Using Stack Overflow
by
Md Johirul Islam
et al
|
|
|
|
06-27-2019
|
Improving Academic Plagiarism Detection for STEM
Documents by Analyzing Mathematical Content and
Citations
by
Norman Meuschke
et al
|
|
|
|
06-25-2019
|
Geo-Based Scheduling for C-V2X Networks
by
Rafael Molina-Masegosa
et al
|
|
|
|
06-26-2019
|
Stress-SGX: Load and Stress your Enclaves for Fun and
Profit
by
Sébastien Vaucher
et al
|
|
|
|
06-26-2019
|
A study on Stokes-Brinkman dimensionless model for flow
in porous media
by
Anna Caroline Felix Santos de Jesus
|
|
|
|
06-28-2019
|
Pinpointing Performance Inefficiencies in Java
by
Pengfei Su
et al
|
|
|
|
06-27-2019
|
Invariant Detection with Program Verification Tools
by
Wei He
|
|
|
|
06-25-2019
|
Blocking Mechanism of Porn Website in India: Claim and
Truth
by
Saurabh Pandey
et al
|
|
|
|
06-27-2019
|
Reconfiguration Algorithms for High Precision
Communications in Time Sensitive Networks: Time-Aware
Shaper Configuration with IEEE 802.1Qcc (Extended
Version)
by
Ahmed Nasrallah
et al
|
|
|
|
06-27-2019
|
Smallest graphs achieving the Stinson bound
by
Mate Gyarmati
et al
|
|
|
|
06-26-2019
|
Reasoning about Hypothetical Agent Behaviours and their
Parameters
by
Stefano V. Albrecht
et al
|
|
|
|
06-25-2019
|
Computer-Supported Collaborative Learning in Software
Engineering Education: A Systematic Mapping Study
by
Antti Knutas
et al
|
|
|
|
06-25-2019
|
Singularity formation as a wetting mechanism in a
dispersionless water wave model
by
R. Camassa
et al
|
|
|
|
06-27-2019
|
Methodology of Designing Multi-agent Robot Control
Systems Utilising Hierarchical Petri Nets
by
Maksym Figat
et al
|
|
|
|
06-25-2019
|
Straggler Mitigation at Scale
by
Mehmet Fatih Aktas
et al
|
|
|
|
06-25-2019
|
Automatic Conversion from Flip-flop to 3-phase
Latch-based Designs
by
Huimei Cheng
et al
|
|
|
|
06-26-2019
|
Reconstructing Perceived Images from Brain Activity by
Visually-guided Cognitive Representation and
Adversarial Learning
by
Ziqi Ren
et al
|
|
|
|
06-26-2019
|
Interactive Physics-Inspired Traffic Congestion
Management
by
Hossein Rastgoftar
|
|
|
|
06-26-2019
|
On the correctness of Egalitarian Paxos
by
Pierre Sutra
|
|
|
|
06-25-2019
|
Proxy Certificates: The Missing Link in the Webs Chain
of Trust
by
L. Chuat
et al
|
|
|
|
06-26-2019
|
FSM Error Messages
by
Marco T. Morazán
et al
|
|
|
|
06-26-2019
|
Automatic Coverage Selection for Surface-Based Visual
Localization
by
James Mount
et al
|
|
|
|
06-28-2019
|
SybilQuorum: Open Distributed Ledgers Through Trust
Networks
by
Alberto Sonnino
et al
|
|
|
|
06-27-2019
|
Towards Large-Scale Autonomous Wireless Sensor Networks
by
Francesco Fraternali
|
|
|
|
06-27-2019
|
Semantic Preserving Bijective Mappings for Expressions
involving Special Functions in Computer Algebra Systems
and Document Preparation Systems
by
Andre Greiner-Petter
et al
|
|
|
|