Computer Science

49942 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
A New Sphere-Packing Bound for Maximal Error Exponent for Multiple-Access Channels
By Ali Nazari, S, eep Pradhan · ArXiv: 0803.3645
2008-03-27
0
Distributed Averaging in the presence of a Sparse Cut
By Hariharan Narayanan · ArXiv: 0803.3642
2008-05-01
0
Void Traversal for Guaranteed Delivery in Geometric Routing
By Mikhail Nesterenko, Adnan Vora · ArXiv: 0803.3632
2016-11-15
1
The Category-Theoretic Arithmetic of Information
By Benjamin Allen · ArXiv: 0803.3608
2008-07-21
0
New Families of Triple Error Correcting Codes with BCH Parameters
By Carl Bracken · ArXiv: 0803.3553
2008-12-18
0
Reinforcement Learning by Value Gradients
By Michael Fairbank · ArXiv: 0803.3539
2008-03-26
0
A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach
By Daniel Raible, Henning Fernau · ArXiv: 0803.3531
2008-12-18
0
Multiagent Approach for the Representation of Information in a Decision Support System
By Fahem Kebair (LITIS), Frederic Serin (LITIS) · ArXiv: 0803.3501
2008-12-18
2
Robustness and Regularization of Support Vector Machines
By Huan Xu, Constantine Caramanis, Shie Mannor · ArXiv: 0803.3490
2010-02-25
0
Diversity of Online Community Activities
By Tad Hogg, Gabor Szabo · ArXiv: 0803.3482
2015-05-13
0
A Local Mean Field Analysis of Security Investments in Networks
By Marc Lelarge, Jean Bolot · ArXiv: 0803.3455
2008-06-19
0
Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks
By Esam Mlaih, Salah A. Aly · ArXiv: 0803.3448
2016-11-18
1
Twenty-Five Moves Suffice for Rubiks Cube
By Tomas Rokicki · ArXiv: 0803.3435
2008-03-25
0
Organization of modular networks
By S. N. Dorogovtsev, J. F. F. Mendes, A. N. Samukhin · ArXiv: 0803.3422
2009-11-13
0
Some results on $mathbb{R}$-computable structures
By Wesley Calvert, John E. Porter · ArXiv: 0803.3404
2009-06-09
0
Node discovery in a networked organization
By Yoshiharu Maeno · ArXiv: 0803.3363
2016-11-15
1
Asymptotics of input-constrained binary symmetric channel capacity
By Guangyue Han, Brian Marcus · ArXiv: 0803.3360
2009-08-10
0
Performance Evaluation of Multiple TCP connections in iSCSI
By Bhargava Kumar K, Ganesh M. Narayan, K. Gopinath · ArXiv: 0803.3338
2008-12-18
0
Loss Fluctuations and Temporal Correlations in Network Queues
By I. V. Lerner, I. V. Yurkevich A. S. Stepanenko, C. C. Constantinou · ArXiv: 0803.3314
2008-03-26
0
Archiving: The Overlooked Spreadsheet Risk
By Victoria Lemieux · ArXiv: 0803.3231
2008-03-25
1
A Type System for Data-Flow Integrity on Windows Vista
By Avik Chaudhuri, Prasad Naldurg, Sriram Rajamani · ArXiv: 0803.3230
2008-12-18
1
Eye-Tracking Evolutionary Algorithm to minimize users fatigue in IEC applied to Interactive One-Max problem
By Denis Pallez (LIRIS), Philippe Collard (I3S), Thierry Baccino (LPEQ) · ArXiv: 0803.3192
2008-12-18
0
Labeled Natural Deduction Systems for a Family of Tense Logics
By Luca Vigan`o, Marco Volpe · ArXiv: 0803.3187
2008-03-25
0
On the Diversity-Multiplexing Tradeoff in Multiple-Relay Network
By Shahab Oveis Gharan, Alireza Bayesteh, Amir K. Kh · ArXiv: 0803.3117
2008-06-08
2
Concurrent Composition and Algebras of Events, Actions, and Processes
By Mark Burgin a, Marc L. Smith · ArXiv: 0803.3099
2008-03-24
0
Idiotypic Immune Networks in Mobile Robot Control
By Am, a Whitbrook, Uwe Aickelin · ArXiv: 0803.2981
2010-07-05
2
Rule Generalisation in Intrusion Detection Systems using Snort
By Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts · ArXiv: 0803.2973
2010-07-05
2
A Recommender System based on Idiotypic Artificial Immune Networks
By Steve Cayzer, Uwe Aickelin · ArXiv: 0803.2970
2010-07-05
0
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
By Uwe Aickelin, Larry Bull · ArXiv: 0803.2966
2010-07-05
1
An Indirect Genetic Algorithm for Set Covering Problems
By Uwe Aickelin · ArXiv: 0803.2965
2010-07-05
2
«« « 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 » »»