arXiv Analytics

Sign in

Article ListsShowing 1-20

  1. arXiv:1704.08688 (Published 2017-04-27)

    SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

    Muhammad Usman, Irfan Ahmed, M. Imran Aslam, Shujaat Khan, Usman Ali Shah
    Comments: Original article is available at SAI IJACSA Vol 8 No 1 2007
    Journal: (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017
    Categories: cs.CR, cs.IT, math.IT
  2. arXiv:1704.08687 (Published 2017-04-27)

    Schubert cycles and subvarieties of generalized Severi-Brauer varieties

    Caroline Junkins, Daniel Krashen, Nicole Lemire
  3. arXiv:1704.08686 (Published 2017-04-27)

    Deep Functional Maps: Structured Prediction for Dense Shape Correspondence

    Or Litany, Tal Remez, Emanuele Rodolà, Alex M. Bronstein, Michael M. Bronstein
  4. arXiv:1704.08685 (Published 2017-04-27)

    The Einstein--null dust system in spherical symmetry with an inner mirror: structure of the maximal development and Cauchy stability

    Georgios Moschidis
  5. arXiv:1704.08684 (Published 2017-04-27)

    Periodic Anderson model with Holstein phonons for the description of the Cerium volume collapse

    Enzhi Li, Shuxiang Yang, Peng Zhang, Ka-Ming Tam, Mark Jarrell, Juana Moreno
  6. arXiv:1704.08683 (Published 2017-04-27)

    Optimal Sample Complexity for Matrix Completion and Related Problems via $\ell_2$-Regularization

    Maria-Florina Balcan, Yingyu Liang, David P. Woodruff, Hongyang Zhang
  7. arXiv:1704.08681 (Published 2017-04-27)

    A proof of the instability of AdS for the Einstein--null dust system with an inner mirror

    Georgios Moschidis
  8. arXiv:1704.08680 (Published 2017-04-27)

    Combinatorial 6/5-Approximation of Steiner Tree

    Ali Çivril
    Comments: 20 pages, 9 figures
    Categories: cs.DS
  9. arXiv:1704.08679 (Published 2017-04-27)

    Age-Minimal Transmission in Energy Harvesting Two-hop Networks

    Ahmed Arafa, Sennur Ulukus
  10. arXiv:1704.08678 (Published 2017-04-27)

    Non-Uniform Attacks Against Pseudoentropy

    Maciej Skorski, Krzysztof Pietrzak
  11. arXiv:1704.08677 (Published 2017-04-27)

    Fluctuations in an established transmission in the presence of a complex environment

    Dmitry V. Savin, Martin Richter, Ulrich Kuhl, Olivier Legrand, Fabrice Mortessagne
  12. arXiv:1704.08676 (Published 2017-04-27)

    A quantitative assessment of the effect of different algorithmic schemes to the task of learning the structure of Bayesian Networks

    Stefano Beretta, Mauro Castelli, Ivo Goncalves, Daniele Ramazzotti
  13. arXiv:1704.08675 (Published 2017-04-27)

    Multi-cut Solutions in Chern-Simons Matrix Models

    Takeshi Morita, Kento Sugiyama
  14. arXiv:1704.08674 (Published 2017-04-27)

    Towards UV Finiteness of Infinite Derivative Theories of Gravity and Field Theories

    Spyridon Talaganis, Anupam Mazumdar
  15. arXiv:1704.08673 (Published 2017-04-27)

    Partial regularity of harmonic maps from a Riemannian manifold into a Lorentzian manifold

    Jiayu Li, Lei Liu
  16. arXiv:1704.08672 (Published 2017-04-27)

    Local Marchenko-Pastur Law for Random Bipartite Graphs

    Kevin Yang
  17. arXiv:1704.08671 (Published 2017-04-27)

    Construction of the Lindström valuation of an algebraic extension

    Dustin Cartwright
  18. arXiv:1704.08670 (Published 2017-04-27)

    The ZX calculus is a language for surface code lattice surgery

    Niel de Beaudrap, Dominic Horsman
  19. arXiv:1704.08669 (Published 2017-04-27)

    Evolution of moments and correlations in non-renewal escape-time processes

    Wilhelm Braun, Rüdiger Thul, André Longtin
    Comments: 14 pages, 12 figures, 1 appendix. Accepted for publication in Physical Review E
  20. arXiv:1704.08668 (Published 2017-04-27)

    Picture-perfect Quantum Key Distribution

    Aleks Kissinger, Sean Tull, Bas Westerbaan
    Comments: 10 pages, many string diagrams
    Categories: quant-ph