Computer Science

55518 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network
By Rakesh Kumar, Mayank Dave · ArXiv: 1108.2095
2011-08-11
0
A Comparative Study of Various Routing Protocols in VANET
By Rakesh Kumar, Mayank Dave · ArXiv: 1108.2094
2011-08-11
0
Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly
By Raluca Ada Popa, Aless, ro Chiesa · ArXiv: 1108.2080
2011-08-11
1
Can User-Level Probing Detect and Diagnose Common Home-WLAN Pathologies?
By Partha Kanuparthy, Constantine Dovrolis, Konstantina Papagiannaki · ArXiv: 1108.2070
2011-09-02
2
Uncertain Nearest Neighbor Classification
By Fabrizio Angiulli, Fabio Fassetti · ArXiv: 1108.2054
2011-08-11
0
A Distributed Newton Approach for Joint Multi-Hop Routing and Flow Control: Theory and Algorithm
By Jia Liu, Hanif D. Sherali · ArXiv: 1108.1989
2011-08-11
0
A Knowledge Mining Model for Ranking Institutions using Rough Computing with Ordering Rules and Formal Concept analysis
By D. P. Acharjya, L. Ezhilarasi · ArXiv: 1108.1986
2011-08-10
0
Succinct Representations of Permutations and Functions
By J. Ian Munro, Rajeev Raman, Venkatesh Raman · ArXiv: 1108.1983
2011-08-10
0
HybridNN: Supporting Network Location Service on Generalized Delay Metrics
By Yongquan Fu, Yijie Wang, Ernst Biersack · ArXiv: 1108.1928
2011-08-10
0
Computing a Maximal Independent Set Using Beeps
By Alej, ro Cornejo, Bernhard Haeupler · ArXiv: 1108.1926
2011-08-10
1
Noise effects in the quantum search algorithm from the computational complexity point of view
By Piotr Gawron, Jerzy Klamka, Ryszard Winiarczyk · ArXiv: 1108.1915
2018-11-19
2
Technical Report: Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks
By Ahmed Bader, Karim Abed-Meraim, Mohamed-Slim Alouini · ArXiv: 1108.1914
2015-03-19
0
Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Process Calculi
By Marco Bernardo (Dipartimento di Scienze di Base e Fondamenti -- Universita di Urbino -- Italy), Rocco De Nicola (IMT -- Institute for Advanced Studies Lucca -- Italy, Dipartimento di Sistemi e Informatica -- Universita di Firenze -- Italy) · ArXiv: 1108.1865
2011-08-10
0
Parameterized Verification of Safety Properties in Ad Hoc Network Protocols
By Giorgio Delzanno, Arnaud Sangnier, Gianluigi Zavattaro · ArXiv: 1108.1864
2011-08-10
0
A Process Algebra for Supervisory Coordination
By Jos Baeten (Department of Mechanical Engineering, Eindhoven University of Technology), Bert van Beek (Department of Mechanical Engineering · ArXiv: 1108.1863
2011-08-10
1
Input-output Conformance Testing for Channel-based Service Connectors
By Natallia Kokash (Centrum Wiskunde en Informatica), Farhad Arbab (Centrum Wiskunde en Informatica), Behnaz Changizi (Centrum Wiskunde en Informatica) · ArXiv: 1108.1862
2011-08-10
0
Towards reduction of Paradigm coordination models
By Suzana Andova (Eindhoven University of Technology), Luuk Groenewegen (Leiden University), Erik de Vink (Eindhoven University of Technology) · ArXiv: 1108.1861
2011-08-10
1
Why Philosophers Should Care About Computational Complexity
By Scott Aaronson · ArXiv: 1108.1791
2024-05-11
0
G-NetMon: A GPU-accelerated Network Performance Monitoring System for Large Scale Scientific Collaborations
By Wenji Wu, Phil DeMar, Don Holmgren · ArXiv: 1108.1785
2011-08-09
0
Random greedy triangle-packing beyond the 7/4 barrier
By Tom Bohman, Alan Frieze, Eyal Lubetzky · ArXiv: 1108.1781
2012-10-29
1
Activized Learning: Transforming Passive to Active with Improved Label Complexity
By Steve Hanneke · ArXiv: 1108.1766
2011-08-09
0
Efficient Sum-Based Hierarchical Smoothing Under ell_1-Norm
By Siavosh Benabbas, Hyun Chul Lee, Joel Oren · ArXiv: 1108.1751
2011-08-09
1
Quantum cryptography
By Dag Roar Hjelme, Lars Lydersen, Vadim Makarov · ArXiv: 1108.1718
2011-08-09
0
A new embedding quality assessment method for manifold learning
By Peng Zhang, Yuanyuan Ren, Bo Zhang · ArXiv: 1108.1636
2011-08-09
0
Load Balancing for MapReduce-based Entity Resolution
By Lars Kolb, Andreas Thor, Erhard Rahm · ArXiv: 1108.1631
2015-03-19
0
Multilayer Approach to Defend Phishing Attacks
By Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee · ArXiv: 1108.1593
2011-08-09
0
Wireless MIMO Switching with Zero-forcing Relaying and Network-coded Relaying
By Fanggang Wang, Soung Chang Liew, Dongning Guo · ArXiv: 1108.1522
2015-03-19
1
How Hidden are Hidden Processes? A Primer on Crypticity and Entropy Convergence
By John R. Mahoney, Christopher J. Ellison, Ryan G. James · ArXiv: 1108.1510
2015-05-30
0
Gender Recognition Based on Sift Features
By Sahar Yousefi, Morteza Zahedi · ArXiv: 1108.1500
2011-08-09
0
Just Enough Ontology Engineering
By P. Di Maio · ArXiv: 1108.1488
2011-08-09
0
«« « 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 » »»