Computer Science

51948 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Performance of LDPC Codes Under Faulty Iterative Decoding
By Lav R. Varshney · ArXiv: 0806.1215
2010-05-31
0
Belief Propagation and Beyond for Particle Tracking
By Michael Chertkov, Lukas Kroc, Massimo Vergassola · ArXiv: 0806.1199
2008-06-09
2
Utilisation des grammaires probabilistes dans les t^aches de segmentation et dannotation prosodique
By Irina Nesterenko (LPL), Stephane Rauzy (LPL) · ArXiv: 0806.1156
2008-12-18
1
Unsatisfiable CNF Formulas need many Conflicts
By Dominik Scheder, Philipp Zumstein · ArXiv: 0806.1148
2010-09-07
3
Significant Diagnostic Counterexamples in Probabilistic Model Checking
By Miguel E. Andres, Pedro DArgenio, Peter van Rossum · ArXiv: 0806.1139
2008-06-09
2
On the Approximability of Comparing Genomes with Duplicates
By Sebastien Angibaud (LINA), Guillaume Fertin (LINA), Irena Rusu (LINA) · ArXiv: 0806.1103
2008-12-18
1
Fair Access Provisioning through Contention Parameter Adaptation in the IEEE 802.11e Infrastructure Basic Service Set
By Feyza Keceli, Inanc Inan, Ender Ayanoglu · ArXiv: 0806.1093
2008-06-09
2
Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
By Feyza Keceli, Inanc Inan, Ender Ayanoglu · ArXiv: 0806.1089
2008-06-09
1
Capacity of Block-Memoryless Channels with Causal Channel Side Information
By Hamid Farmanbar, Amir K. Kh, ani · ArXiv: 0806.1062
2008-06-09
3
3-connected Planar Graph Isomorphism is in Log-space
By Samir Datta, Nutan Limaye, Prajakta Nimbhorkar · ArXiv: 0806.1041
2008-09-16
3
Analysis of a procedure for inserting steganographic data into VoIP calls
By Wojciech Mazurczyk, Jozef Lubacz · ArXiv: 0806.1034
2008-08-25
3
A Comparison of Performance Measures for Online Algorithms
By Joan Boyar, S, y Irani · ArXiv: 0806.0983
2012-10-15
1
On convergence-sensitive bisimulation and the embedding of CCS in timed CCS
By Roberto Amadio (PPS) · ArXiv: 0806.0936
2010-07-01
2
Drawing Binary Tanglegrams: An Experimental Evaluation
By Martin N"ollenburg, Danny Holten, Markus V"olker · ArXiv: 0806.0928
2009-05-15
1
The Mixing Time of Glauber Dynamics for Colouring Regular Trees
By Leslie Ann Goldberg, Mark Jerrum, Marek Karpinski · ArXiv: 0806.0921
2008-06-06
3
Drawing (Complete) Binary Tanglegrams: Hardness, Approximation, Fixed-Parameter Tractability
By Kevin Buchin, Maike Buchin, Jaroslaw Byrka · ArXiv: 0806.0920
2010-09-17
2
Outage and Local Throughput and Capacity of Random Wireless Networks
By Martin Haenggi · ArXiv: 0806.0909
2016-11-18
2
Channel Capacity Limits of Cognitive Radio in Asymmetric Fading Environments
By Himal A. Suraweera, Jason Gao, Peter J. Smith · ArXiv: 0806.0905
2016-11-18
1
Towards sustainable transport: wireless detection of passenger trips on public transport buses
By Vassilis Kostakos · ArXiv: 0806.0874
2013-12-05
1
On the Security of Liaw et al.s Scheme
By Amit K Awasthi · ArXiv: 0806.0860
2008-06-06
2
A Dynamic Programming Framework for Combinatorial Optimization Problems on Graphs with Bounded Pathwidth
By Mugurel Ionut Andreica · ArXiv: 0806.0840
2012-12-18
2
Performance Analysis of Multiple Antenna Multi-User Detection
By Javad Kazemitabar, Hamid Jafarkhani · ArXiv: 0806.0838
2008-06-05
3
Upper and Lower Bounds on Black-Box Steganography
By Nenad Dedic, Gene Itkis, Leonid Reyzin · ArXiv: 0806.0837
2008-06-05
1
Collaborative model of interaction and Unmanned Vehicle Systems interface
By Sylvie Saget, Francois Legras, Gilles Coppin · ArXiv: 0806.0784
2008-12-18
1
On Peak versus Average Interference Power Constraints for Protecting Primary Users in Cognitive Radio Networks
By Rui Zhang · ArXiv: 0806.0676
2008-09-12
3
Information-theoretic limits on sparse signal recovery: Dense versus sparse measurement matrices
By Wei Wang, Martin J. Wainwright, Kannan Ramch · ArXiv: 0806.0604
2008-06-04
2
Multirate Synchronous Sampling of Sparse Multiband Signals
By Michael Fleyer, Amir Rosenthal, Alex Linden · ArXiv: 0806.0579
2008-06-04
1
Steganographic Routing in Multi Agent System Environment
By Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk · ArXiv: 0806.0576
2008-06-04
2
Universal Coding on Infinite Alphabets: Exponentially Decreasing Envelopes
By Dominique Bontemps (LM-Orsay) · ArXiv: 0806.0562
2011-07-07
1
Sincere-Strategy Preference-Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control
By Gabor Erdelyi, Markus Nowak, Joerg Rothe · ArXiv: 0806.0535
2009-06-12
2
«« « 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 » »»