Computer Science

49808 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Scaling Laws and Techniques in Decentralized Processing of Interfered Gaussian Channels
By Amichai S, erovich, Michael Peleg · ArXiv: 0801.4129
2009-12-08
0
Strategic Alert Throttling for Intrusion Detection Systems
By Gianni Tedesco, Uwe Aickelin · ArXiv: 0801.4119
2010-07-05
0
Quantified Propositional Logspace Reasoning
By Steven Perron (University of Toronto) · ArXiv: 0801.4105
2008-01-29
0
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
By Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura · ArXiv: 0801.4082
2008-01-29
1
An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs
By Elena Dubrova (Royal Institute of Technology) · ArXiv: 0801.4079
2008-01-30
3
The optimal assignment kernel is not positive definite
By Jean-Philippe Vert (CB) · ArXiv: 0801.4061
2008-01-29
0
Bounded Mean-Delay Throughput and Non-Starvation Conditions in Aloha Network
By Soung Chang Liew, Ying Jun Zhang, Da Rui Chen · ArXiv: 0801.4054
2008-07-14
0
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
By Zhu Han, Xin Zhang, H. Vincent Poor · ArXiv: 0801.4048
2016-11-17
0
Set-based complexity and biological information
By David J. Galas, Matti Nykter, Gregory W. Carter · ArXiv: 0801.4024
2008-01-28
0
New Constructions of Permutation Arrays
By Lizhen Yang, Kefei Chen, Luo Yuan · ArXiv: 0801.3987
2008-01-28
1
New Lower Bounds on Sizes of Permutation Arrays
By Lizhen Yang, Kefei Chen, Luo Yuan · ArXiv: 0801.3986
2008-01-28
0
Cobweb posets - Recent Results
By A. Krzysztof Kwasniewski, M. Dziemianczuk · ArXiv: 0801.3985
2011-01-11
0
New Upper Bounds on Sizes of Permutation Arrays
By Lizhen Yang, Ling Dong, Kefei Chen · ArXiv: 0801.3983
2008-01-28
0
Pseudo-Random Bit Generation based on 2D chaotic maps of logistic type and its Applications in Chaotic Cryptography
By C. Pellicer-Lostao, R. Lopez-Ruiz · ArXiv: 0801.3982
2008-01-28
0
Crossing Borders: Security and Privacy Issues of the European e-Passport
By Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs · ArXiv: 0801.3930
2008-01-28
0
On the Weight Distribution of the Extended Quadratic Residue Code of Prime 137
By C. Tjhai, M. Tomlinson, M. Ambroze · ArXiv: 0801.3926
2008-01-28
0
Increased security through open source
By Jaap-Henk Hoepman, Bart Jacobs · ArXiv: 0801.3924
2021-08-23
0
On the Continuity Set of an omega Rational Function
By Olivier Carton (LIAFA), Olivier Finkel (LIP), Pierre Simonnet (SPE) · ArXiv: 0801.3912
2008-01-28
0
Spectral efficiency and optimal medium access control of random access systems over large random spreading CDMA
By Yi Sun · ArXiv: 0801.3880
2016-11-15
0
Hash Property and Coding Theorems for Sparse Matrices and Maximum-Likelihood Coding
By Jun Muramatsu, Shigeki Miyake · ArXiv: 0801.3878
2013-01-28
1
On the Scaling Window of Model RB
By Chunyan Zhao, Ke Xu, Zhiming Zheng · ArXiv: 0801.3871
2008-01-28
0
Comparison of Spreadsheets with other Development Tools (limitations, solutions, workarounds and alternatives)
By Simon Murphy · ArXiv: 0801.3853
2024-12-31
0
Analysis of Prime Reciprocal Sequences in Base 10
By Sumanth Kumar Reddy Gangasani · ArXiv: 0801.3841
2008-01-25
0
Universal Fingerprinting: Capacity and Random-Coding Exponents
By Pierre Moulin · ArXiv: 0801.3837
2011-05-26
2
Dichotomy Results for Fixed-Point Existence Problems for Boolean Dynamical Systems
By Sven Kosub · ArXiv: 0801.3802
2008-12-01
5
Characterization of the Vertices and Extreme Directions of the Negative Cycles Polyhedron and Hardness of Generating Vertices of 0/1-Polyhedra
By Endre Boros, Khaled Elbassioni, Vladimir Gurvich · ArXiv: 0801.3790
2008-04-28
1
Graph-Based Classification of Self-Dual Additive Codes over Finite Fields
By Lars Eirik Danielsen · ArXiv: 0801.3773
2009-11-11
0
Modular Compilation of a Synchronous Language
By Annie Ressouche, Daniel Gaffe (LEAT), Valerie Roy · ArXiv: 0801.3715
2009-04-20
0
5-cycles and the Petersen graph
By Matt DeVos, Vahan V. Mkrtchyan, Samvel S. Petrosyan · ArXiv: 0801.3714
2008-01-25
0
Picking up the Pieces: Self-Healing in Reconfigurable Networks
By Jared Saia, Amitabh Trehan · ArXiv: 0801.3710
2016-11-17
0
«« « 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 » »»