Computer Science

55518 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Biomimetic use of genetic algorithms
By Jean-Louis Dessalles (INFRES, LTCI) · ArXiv: 1108.4199
2011-08-24
0
A New Enforcement on Declassification with Reachability Analysis
By Cong Sun, Liyong Tang, Zhong Chen · ArXiv: 1108.4172
2016-11-18
0
Dynamic Pricing with Limited Supply
By Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg · ArXiv: 1108.4142
2013-11-27
0
QoS Routing using OLSR with Optimization for Flooding
By Suman Banik, Bibhash Roy, Parthi Dey · ArXiv: 1108.4138
2011-08-23
0
The Information Flow Framework: A Descriptive Category Metatheory
By Robert E. Kent · ArXiv: 1108.4133
2011-09-05
0
Spatial Interactions of Peers and Performance of File Sharing Systems
By Franc{c}ois Baccelli (INRIA Rocquencourt, LINCS), Fabien Mathieu (LINCS · ArXiv: 1108.4129
2012-06-19
0
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
By Shantanu Pal, Sunirmal Khatua, Nabendu Chaki · ArXiv: 1108.4100
2011-08-23
0
OSD: A Source Level Bug Localization Technique Incorporating Control Flow and State Information in Object Oriented Program
By Partha Pratim Ray · ArXiv: 1108.4094
2011-09-02
0
Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography
By Debiao He · ArXiv: 1108.4076
2011-08-23
2
Backpressure with Adaptive Redundancy (BWAR)
By Majed Alresaini, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari · ArXiv: 1108.4063
2016-11-17
0
More Jabber about the Collatz Conjecture and a Closed Form for Detecting Cycles on Special Subsequences [Assertion: Collatz cycles]
By Thomas W. Lynch · ArXiv: 1108.4056
2011-08-23
0
Multihop Adjustment for the Number of Nodes in Contention-Based MAC Protocols for Wireless Ad hoc Networks
By Ash Mohammad Abbas · ArXiv: 1108.4035
2015-03-19
0
Finding Community Structure with Performance Guarantees in Complex Networks
By Thang N. Dinh, My T. Thai · ArXiv: 1108.4034
2011-08-22
0
Totally distributive toposes
By Rory B.B. Lucyshyn-Wright · ArXiv: 1108.4032
2012-10-22
0
City on the Sky: Flexible, Secure Data Sharing on the Cloud
By Dinh Tien Tuan Anh, Wang Wenqiang, Anwitaman Datta · ArXiv: 1108.3915
2011-09-22
0
Edge covering pseudo-outerplanar graphs with forests
By Xin Zhang, Guizhen Liu, Jian-Liang Wu · ArXiv: 1108.3877
2011-10-20
1
A SWAR Approach to Counting Ones
By Holger Petersen · ArXiv: 1108.3860
2015-07-03
0
Solving puzzles described in English by automated translation to answer set programming and learning how to do that translation
By Chitta Baral, Juraj Dzifcak · ArXiv: 1108.3850
2011-08-22
0
Additive combinatorics with a view towards computer science and cryptography: An exposition
By Khodakhast Bibak · ArXiv: 1108.3790
2012-10-26
0
Policy Iteration is well suited to optimize PageRank
By Romain Holl, ers, Jean-Charles Delvenne · ArXiv: 1108.3779
2011-08-19
0
Downlink Scheduling over Markovian Fading Channels
By Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff · ArXiv: 1108.3768
2015-02-27
0
Self-Organizing Mixture Networks for Representation of Grayscale Digital Images
By Patryk Filipiak · ArXiv: 1108.3757
2011-08-19
27
On the Intersection of All Critical Sets of a Unicyclic Graph
By Vadim E. Levit, Eugen M, rescu · ArXiv: 1108.3756
2011-08-19
12
Computational Models of Certain Hyperspaces of Quasi-metric Spaces
By Massoud Pourmahdian, Mahdi Ali-Akbari · ArXiv: 1108.3736
2015-07-01
0
Evaluating Impact of Mobility on Wireless Routing Protocols
By N. Javaid, M. Yousaf, A. Ahmad · ArXiv: 1108.3708
2016-11-17
0
Identifying Design Requirements for Wireless Routing Link Metrics
By Nadeem Javaid, Muti Ullah, Karim Djouani · ArXiv: 1108.3706
2016-11-17
0
Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols
By Nadeem Javaid, Ayesha Bibi, Akmal Javaid · ArXiv: 1108.3703
2011-08-19
0
Substring Range Reporting
By Philip Bille, Inge Li Goertz · ArXiv: 1108.3683
2011-08-19
0
AIG Rewriting Using 5-Input Cuts
By Nan Li, Elena Dubrova · ArXiv: 1108.3675
2011-08-19
0
The bottleneck 2-connected $k$-Steiner network problem for $kleq 2$
By M. Brazil, C.J. Ras, D.A. Thomas · ArXiv: 1108.3655
2013-01-22
0
«« « 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 » »»