Computer Science

52457 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Regularization of Invers Problem for M-Ary Channel
By N. A. Filimonova · ArXiv: 0806.0142
2008-06-03
3
Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks
By Feng Xia, Wenhong Zhao, Youxian Sun · ArXiv: 0806.0134
2008-12-18
4
Feedback Scheduling of Priority-Driven Control Networks
By Feng Xia, Youxian Sun, Yu-Chu Tian · ArXiv: 0806.0130
2008-12-18
1
QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks
By Feng Xia · ArXiv: 0806.0128
2008-12-18
2
A note on clique-width and tree-width for structures
By Hans Adler, Isolde Adler · ArXiv: 0806.0103
2008-06-03
0
Canonical calculi with (n,k)-ary quantifiers
By Arnon Avron, Anna Zamansky · ArXiv: 0806.0081
2015-07-01
0
Outer Bounds for Multiple Access Channels with Feedback using Dependence Balance
By Ravi T, on, Sennur Ulukus · ArXiv: 0806.0080
2016-11-17
0
Managing conflicts between users in Wikipedia
By Bernard Jacquemin (LIMSI), Aurelien Lauf (LIMSI), Celine Poudat (LTCI) · ArXiv: 0805.4754
2008-12-18
0
New Construction of 2-Generator Quasi-Twisted Codes
By Eric Z. Chen · ArXiv: 0805.4748
2008-06-02
0
Pattern-based Model-to-Model Transformation: Long Version
By Juan de Lara, Esther Guerra · ArXiv: 0805.4745
2008-12-18
0
La fiabilite des informations sur le web
By Bernard Jacquemin (LIMSI), Aurelien Lauf (LIMSI), Celine Poudat (LTCI) · ArXiv: 0805.4722
2008-12-18
0
Report on article The Travelling Salesman Problem: A Linear Programming Formulation
By Radoslaw Hofman · ArXiv: 0805.4718
2008-06-02
0
Telex: Principled System Support for Write-Sharing in Collaborative Applications
By ** Lamia Benmouffok, Jean‑Michel Busca, Joan Manuel Marquès · ArXiv: 0805.4680
2008-12-18
0
On Secure Distributed Implementations of Dynamic Access Control
By Avik Chaudhuri · ArXiv: 0805.4665
2008-06-02
0
Uplink Macro Diversity of Limited Backhaul Cellular Network
By Amichai S, erovich, Oren Somekh · ArXiv: 0805.4620
2008-06-02
0
Community Detection using a Measure of Global Influence
By ** - Rumi Ghosh (University of Southern California, Information Sciences Institute) - Kristina Lerman (University of Southern California, Information Sciences Institute) ** · ArXiv: 0805.4606
2008-12-18
0
Channels that Heat Up
By Tobias Koch, Amos Lapidoth, Paul P. Sotiriadis · ArXiv: 0805.4583
2016-11-17
0
Rock mechanics modeling based on soft granulation theory
By ** - H. Owladeghaffari (Dept. of Mining & Metallurgical Engineering, Amirkabir University of Technology, Tehran · ArXiv: 0805.4560
2014-07-29
2
Modeling Loosely Annotated Images with Imagined Annotations
By ** 홍 탕 (Hong Tang)¹, 노자 부제마 (Nozha Boujemma)², 윤하오 첸 (Yunhao Chen)³ ¹ ADREM · ArXiv: 0805.4508
2008-05-30
0
Golden Space-Time Block Coded Modulation
By L. Luzzi, G. Rekaya-Ben Othman, J.-C. Belfiore · ArXiv: 0805.4502
2008-05-30
0
Exact Matrix Completion via Convex Optimization
By Emmanuel J. C, es, Benjamin Recht · ArXiv: 0805.4471
2008-05-30
0
Low-Complexity Structured Precoding for Spatially Correlated MIMO Channels
By Vasanthan Raghavan, Akbar Sayeed, Venu Veeravalli · ArXiv: 0805.4425
2009-09-29
0
Confidentiality, Integrity and High Availability with Open Source IT green
By ** Luciana Guimarães (University of Managerial Sciences UNA, Brazil – Minas Gerais, Belo Horizonte) ** · ArXiv: 0805.4394
2008-05-29
1
Capacity Bounds for Broadcast Channels with Confidential Messages
By Jin Xu, Yi Cao, Biao Chen · ArXiv: 0805.4374
2016-11-17
0
Quantization of Prior Probabilities for Hypothesis Testing
By Kush R. Varshney, Lav R. Varshney · ArXiv: 0805.4338
2008-09-20
0
Balanced Families of Perfect Hash Functions and Their Applications
By Noga Alon, Shai Gutner · ArXiv: 0805.4300
2008-12-18
0
From Data Topology to a Modular Classifier
By ** - Abdellatif ENNAJI (Université de Rouen, 프랑스) - Arnaud RIBERT (Université de Rouen, 프랑스) - Yves LECOURTIER (Université de Rouen · ArXiv: 0805.4290
2008-12-18
0
On the Capacity of Wireless Multicast Networks
By Seyed Reza Mirghaderi, Alireza Bayesteh, Amir K. Kh · ArXiv: 0805.4248
2008-05-29
0
Risk Assessment For Spreadsheet Developments: Choosing Which Models to Audit
By ** Raymond J. Butler, CISA (HM Customs & Excise, UK) ** · ArXiv: 0805.4236
2008-05-29
0
Managing Critical Spreadsheets in a Compliant Environment
By ** - **Soheil Saadat** – President & CEO, Prodiance Corporation (San Ramon, CA · ArXiv: 0805.4211
2008-05-29
0
«« « 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 » »»