Sciweavers

STACS
2016
Springer
9 years 11 months ago
Entropy Games and Matrix Multiplication Games
Two intimately related new classes of games are introduced and studied: entropy games (EGs) and matrix multiplication games (MMGs). An EG is played on a finite arena by two-and-a...
Eugene Asarin, Julien Cervelle, Aldric Degorre, Ca...
STACS
2016
Springer
9 years 11 months ago
The Complexity of the Hamilton Cycle Problem in Hypergraphs of High Minimum Codegree
We consider the complexity of the Hamilton cycle decision problem when restricted to k-uniform hypergraphs H of high minimum codegree δ(H). We show that for tight Hamilton cycles...
Frederik Garbe, Richard Mycroft
STACS
2016
Springer
9 years 11 months ago
Separation Between Read-once Oblivious Algebraic Branching Programs (ROABPs) and Multilinear Depth Three Circuits
We show an exponential separation between two well-studied models of algebraic computation, namely read-once oblivious algebraic branching programs (ROABPs) and multilinear depth ...
Neeraj Kayal, Vineet Nair, Chandan Saha
119
Voted
STACS
2016
Springer
9 years 11 months ago
Faster Exact and Parameterized Algorithm for Feedback Vertex Set in Tournaments
A tournament is a directed graph T such that every pair of vertices is connected by an arc. A feedback vertex set is a set S of vertices in T such that T −S is acyclic. In this ...
Mithilesh Kumar, Daniel Lokshtanov
SQJ
2016
62views more  SQJ 2016»
9 years 11 months ago
Assessing vulnerability exploitability risk using software properties
Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray
SPM
2016
49views more  SPM 2016»
9 years 11 months ago
Top Downloads in IEEE Xplore [Reader's Choice]
JOURNALS ABSTRACT APR MAR FEB JAN DEC NOV JAN 2006 A TUTORIAL ON PARTICLE FILTERS FOR This article reviews both optimal 28 34 31 15 21 32 21 ONLINE NONLINEAR/NON-GAUSSIAN and subop...
SPL
2016
59views more  SPL 2016»
9 years 11 months ago
Voice Activity Detection: Merging Source and Filter-based Information
—Voice Activity Detection (VAD) refers to the problem of distinguishing speech segments from background noise. Numerous approaches have been proposed for this purpose. Some are b...
Thomas Drugman, Yannis Stylianou, Yusuke Kida, Mas...
SPL
2016
51views more  SPL 2016»
9 years 11 months ago
Complex and Quaternionic Principal Component Pursuit and Its Application to Audio Separation
Abstract—Recently, the principal component pursuit has received increasing attention in signal processing research ranging from source separation to video surveillance. So far, a...
Tak-Shing Chan, Yi-Hsuan Yang
SPL
2016
48views more  SPL 2016»
9 years 11 months ago
ACE-An Effective Anti-forensic Contrast Enhancement Technique
—Detecting Contrast Enhancement (CE) in images and anti-forensic approaches against such detectors have gained much attention in multimedia forensics lately. Several contrast enh...
Hareesh Ravi, A. V. Subramanyam, Sabu Emmanuel
SPL
2016
41views more  SPL 2016»
9 years 11 months ago
Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime
—We propose a systematic concatenated coding scheme based on the combination of interleaving with powerful channel codes and jamming for wireless secrecy under the practical assu...
João P. Vilela, Marco Gomes, Willie K. Harr...