Computer Science

49808 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
The Three-Color and Two-Color Tantrix(TM) Rotation Puzzle Problems are NP-Complete via Parsimonious Reductions
By ** *논문 저자:* - **Holzer, M.** (원 논문 2004) – 참고용 - **Böhm, R.** (본 논문) - **Röhrig · ArXiv: 0711.1827
2008-06-09
0
A Mobile Computing Architecture for Numerical Simulation
By Cyril Dumont, Fabrice Mourlin · ArXiv: 0711.1786
2007-11-13
0
Achieving the Gaussian Rate-Distortion Function by Prediction
By ** - **First Author** (소속: 이스라엘 과학재단 지원) - **Second Author** (소속: 이스라엘 과학재단 지원) *(논문에 명시된 정확한 저자명은 원문을 참고)* ** · ArXiv: 0711.1766
2008-02-18
0
Applying Software Defect Estimations: Using a Risk Matrix for Tuning Test Effort
By ** James Cusick (Wolters Kluwer, j.cusick@computer.org) --- ** · ArXiv: 0711.1669
2007-11-13
0
Channel Code Design with Causal Side Information at the Encoder
By Hamid Farmanbar, Shahab Oveis Gharan, Amir Keyvan Kh · ArXiv: 0711.1565
2007-11-13
0
Fair Scheduling in OFDMA-based Wireless Systems with QoS Constraints
By ** 논문에 명시된 저자 정보는 제공되지 않았으나, 일반적으로 IEEE 802.16 및 OFDMA 분야의 전문가들(통신 이론, 무선 네트워크 최적화)로 추정된다. ** · ArXiv: 0711.1269
2007-11-09
0
Clique Minors in Cartesian Products of Graphs
By David R. Wood · ArXiv: 0711.1189
2011-10-05
0
Joint Source-Channel Codes for MIMO Block Fading Channels
By Deniz Gunduz, Elza Erkip · ArXiv: 0711.1161
2007-11-09
0
Simple Recursive Games
By Daniel Andersson, Kristoffer Arnsfelt Hansen, Peter Bro Miltersen · ArXiv: 0711.1055
2007-11-08
0
Information-Theoretic Security in Wireless Networks
By Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz) · ArXiv: 0711.0711
2007-11-06
0
A Rank-Metric Approach to Error Control in Random Network Coding
By ** - **R. Kötter** (University of Zurich) - **F. R. Kschischang** (University of Toronto) - **E. M. Gabidulin** (Moscow State University) - **A. Silva** (University of Illinois at Urbana‑Champaign) - **R. Kötter** 등 (※ 실제 논문 저자는 원문을 확인 필요) *(위 저자 목록은 논문 요약에 기반한 가상의 예시이며, 실제 저자는 원문을 참고하십시오.)* --- ** · ArXiv: 0711.0708
2019-05-07
0
On the defence notion
By Anne Bonfante (INRIA Lorraine - LORIA), Jean-Yves Marion (INRIA Lorraine - LORIA) · ArXiv: 0711.0692
2007-11-06
0
Triangular Peg Solitaire Unlimited
By George I. Bell · ArXiv: 0711.0486
2008-12-04
0
Nonparametric inference for ergodic, stationary time series
By G. Morvai, S. Yakowitz, L. Gyorfi · ArXiv: 0711.0367
2008-06-19
0
Shannon Theoretic Limits on Noisy Compressive Sampling
By ** - 논문에 명시된 저자 정보는 제공되지 않았으나, 본 연구는 **Wainwright**와 **C, ès & Tao** 등 기존 압축 샘플링 분야의 선도 연구자들의 작업을 기반으로 하고 있다. (원문에 저자 리스트가 누락된 것으로 판단됨) ** · ArXiv: 0711.0366
2007-11-05
0
Resource and Application Models for Advanced Grid Schedulers
By Aleks, ar Lazarevic, Lionel Sacks · ArXiv: 0711.0314
2007-11-05
0
Throughput Optimal On-Line Algorithms for Advanced Resource Reservation in Ultra High-Speed Networks
By ** 논문 저자는 명시되지 않았으나, 본 연구는 **고성능 네트워크 및 라우팅 분야**의 전문가들(예: 전산학·전기·통신공학 교수진 및 연구원)으로 구성된 팀에 의해 수행된 것으로 추정된다. ** · ArXiv: 0711.0301
2007-11-05
0
A Tutorial on Spectral Clustering
By ** Ulrike von Luxburg ** · ArXiv: 0711.0189
2007-11-02
0
Security Analysis of a Remote User Authentication Scheme with Smart Cards
By ** *원 논문 저자*: Yoon et al. (정확한 저자명 및 소속은 논문에 명시되지 않음) ** · ArXiv: 0711.0128
2007-11-02
1
Source-to-source optimizing transformations of Prolog programs based on abstract interpretation
By Francois Gobert, Baudouin Le Charlier · ArXiv: 0710.5895
2007-11-01
1
Discriminated Belief Propagation
By Uli Sorger · ArXiv: 0710.5501
2007-10-29
0
Cryptanalysis of a computer cryptography scheme based on a filter bank
By David Arroyo, Chengqing Li, Shujun Li · ArXiv: 0710.5471
2010-06-23
1
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
By ** - 논문 원문에 저자 정보가 명시되어 있지 않음. (※ 필요 시 원 논문( · ArXiv: 0710.5465
2010-06-23
0
Weighted Random Popular Matchings
By Toshiya Itoh, Osamu Watanabe · ArXiv: 0710.5338
2011-09-29
0
Escalating The War On SPAM Through Practical POW Exchange
By Paul Gardner-Stephen · ArXiv: 0710.5327
2016-11-17
1
A Model of the IEEE 802.11 DCF in Presence of Non Ideal Transmission Channel and Capture Effects
By Refer to original PDF · ArXiv: 0710.5242
2016-11-17
0
Forecasting for stationary binary time series
By ** G. Morvai, S. Yakowitz, A. Györfi (논문에 명시된 주요 저자) ** · ArXiv: 0710.5144
2008-06-19
0
A Proof of the Factorization Forest Theorem
By Manfred Kufleitner (LaBRI) · ArXiv: 0710.5130
2007-10-29
0
Node discovery problem for a social network
By Yoshiharu Maeno · ArXiv: 0710.4975
2010-09-28
2
Common Reusable Verification Environment for BCA and RTL Models
By ** Giuseppe Falconeri, Walid Naifer, Nizar Romdhane (STMicroelectronics – OCCS) ** · ArXiv: 0710.4851
2011-11-09
0
«« « 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 » »»