Computer Science

49942 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Directive words of episturmian words: equivalences and normalization
By Amy Glen, Florence Leve, Gwena"el Richomme · ArXiv: 0802.3888
2010-03-16
0
Rich, Sturmian, and trapezoidal words
By Aldo de Luca, Amy Glen, Luca Q. Zamboni · ArXiv: 0802.3885
2010-04-08
0
Deriving Sorting Algorithms
By ** Jos´e Bacelar Almeida, Jorge Sousa Pinto ** · ArXiv: 0802.3881
2008-02-27
0
Separating NOF communication complexity classes RP and NP
By Matei David, Toniann Pitassi · ArXiv: 0802.3860
2008-02-27
0
The Discrete Hilbert Transform for Non-Periodic Signals
By - **Sumanth Kumar Reddy Gangasani** · ArXiv: 0802.3855
2008-02-27
0
Joint Source Channel Coding with Side Information Using Hybrid Digital Analog Codes
By Makesh Pravin Wilson, Krishna Narayanan, Giuseppe Caire · ArXiv: 0802.3851
2016-09-08
0
On the Kuratowski graph planarity criterion
By ** - **A. Skopenkov** (안드레이 스코펜코프) – 러시아, 모스크바 수학연구소 (MCCME) 소속. ** · ArXiv: 0802.3820
2014-11-27
0
Pattern-Oriented Analysis and Design (POAD) Theory
By Jerry Overton · ArXiv: 0802.3784
2008-02-27
0
Information Hiding Techniques: A Tutorial Review
By Sabu M. Thampi · ArXiv: 0802.3746
2008-02-27
0
Generic case complexity and One-Way functions
By Alex D. Myasnikov · ArXiv: 0802.3734
2008-02-27
0
Preventing Coordinated Attacks Via Distributed Alert Exchange
By Joaquin Garcia-Alfaro, Michael A. Jaeger, Gero Muehl · ArXiv: 0802.3718
2008-02-27
0
Outward Accessibility in Urban Street Networks: Characterization and Improvements
By Bruno Augusto Nassif Travenc{c}olo, Luciano da Fontoura Costa · ArXiv: 0802.3665
2008-02-26
0
Local Information Based Algorithms for Packet Transport in Complex Networks
By ** Bernard Kujawski, G.J. Rodgers, Bosiljka Tadić ** · ArXiv: 0802.3634
2008-02-26
0
Clusters of solutions and replica symmetry breaking in random k-satisfiability
By Andrea Montanari, Federico Ricci-Tersenghi, Guilhem Semerjian · ArXiv: 0802.3627
2009-11-13
0
Color Graphs: An Efficient Model For Two-Dimensional Cellular Automata Linear Rules
By Birendra Kumar Nayak, Sudhakar Sahoo, Sushant Kumar Rout · ArXiv: 0802.3626
2008-02-28
0
Towards a formalization of budgets
By Jan A. Bergstra, Sanne Nolst Trenite, Mark B. van der Zwaag · ArXiv: 0802.3617
2008-02-26
1
Power Allocation for Fading Channels with Peak-to-Average Power Constraints
By Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen · ArXiv: 0802.3611
2008-02-26
0
Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the Unit Circle
By {O}yvind Ryan, Merouane Debbah · ArXiv: 0802.3570
2016-08-14
0
Distributed Sensor Localization in Random Environments using Minimal Number of Anchor Nodes
By Usman A. Khan, Soummya Kar, Jose M. F. Moura · ArXiv: 0802.3563
2013-12-19
0
Data Traffic Dynamics and Saturation on a Single Link
By ** Reginald D. Smith ** · ArXiv: 0802.3554
2011-12-08
0
Approximate Capacity of Gaussian Relay Networks
By Amir Salman Avestimehr, Suhas N. Diggavi, David N C. Tse · ArXiv: 0802.3535
2016-11-17
0
The Complexity of Node Blocking for Dags
By ** Dariusz Dereniowski (Gdańsk University of Technology, Pol, ) – 이메일: `deren@eti.pg.gda.pl` --- ** · ArXiv: 0802.3513
2021-03-05
0
Gaussian Interference Networks: Sum Capacity in the Low Interference Regime and New Outer Bounds on the Capacity Region
By V. Sreekanth Annapureddy, Venugopal V. Veeravalli · ArXiv: 0802.3495
2009-02-15
0
On capacity of wireless ad hoc networks with MIMO MMSE receivers
By Jing Ma, Ying Jun Zhang · ArXiv: 0802.3490
2008-02-26
0
An Empirical Study of End-User Behaviour in Spreadsheet Error Detection & Correction
By Brian Bishop, Kevin McDaid · ArXiv: 0802.3479
2008-03-10
0
Fun Boy Three Were Wrong: it is what you do, not the way that you do it
By Jocelyn Paine · ArXiv: 0802.3476
2008-03-10
0
Spreadsheet Development Methodologies using Resolver: Moving spreadsheets into the 21st Century
By Patrick Kemmis, Giles Thomas · ArXiv: 0802.3475
2008-03-10
0
On Cobweb Posets and Discrete F-Boxes Tilings
By M. Dziemianczuk · ArXiv: 0802.3473
2009-04-02
0
Sketch-Based Estimation of Subpopulation-Weight
By Edith Cohen, Haim Kaplan · ArXiv: 0802.3448
2008-02-26
0
Automatic Verification of Correspondences for Security Protocols
By Bruno Blanchet · ArXiv: 0802.3444
2008-02-26
0
«« « 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 » »»