Computer Science

54884 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Relaxation-based coarsening and multiscale graph organization
By Dorit Ron, Ilya Safro, Achi Br · ArXiv: 1004.1220
2010-04-09
0
Multi-Shift de Bruijn Sequence
By Zhi Xu · ArXiv: 1004.1216
2010-04-09
2
A Deterministic Algorithm for the Vertex Connectivity Survivable Network Design Problem
By Pushkar Tripathi · ArXiv: 1004.1208
2010-04-09
3
On Tsallis Entropy Bias and Generalized Maximum Entropy Models
By Yuexian Hou, Tingxu Yan, Peng Zhang · ArXiv: 1004.1061
2010-04-08
0
Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks
By ** P.M. van de Ven, A.J.E.M. Janssen, J.S.H. van Leeuwaarden ** · ArXiv: 1004.1058
2010-04-08
0
On the completeness of quantum computation models
By Pablo Arrighi, Gilles Dowek · ArXiv: 1004.1027
2015-05-18
0
Message-Passing Inference on a Factor Graph for Collaborative Filtering
By Byung-Hak Kim, Arvind Yedla, Henry D. Pfister · ArXiv: 1004.1003
2010-04-08
0
The Graph Traversal Pattern
By Marko A. Rodriguez, Peter Neubauer · ArXiv: 1004.1001
2010-12-24
0
The Automatic Synthesis of Linear Ranking Functions: The Complete Unabridged Version
By ** (저자 정보는 원문에 명시되지 않았으므로 여기서는 제공되지 않는다.) ** · ArXiv: 1004.0944
2012-04-03
0
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
By Stevens Le Blond (INRIA Sophia Antipolis / INRIA Rh^one-Alpes), Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh^one-Alpes), Fabrice Le Fessant (INRIA Saclay - Ile de France) · ArXiv: 1004.0930
2010-04-08
0
On building minimal automaton for subset matching queries
By Kimmo Fredriksson · ArXiv: 1004.0902
2010-10-04
0
On the Complexity of Local Search for Weighted Standard Set Problems
By Dominic Dumrauf, Tim S"u{ss} · ArXiv: 1004.0871
2015-05-18
0
A Separation of NP and coNP in Multiparty Communication Complexity
By Dmytro Gavinsky, Alex, er A. Sherstov · ArXiv: 1004.0817
2022-03-29
0
From Holant To #CSP And Back: Dichotomy For Holant$^c$ Problems
By Jin-Yi Cai, Sangxia Huang, Pinyan Lu · ArXiv: 1004.0803
2015-03-14
0
A security framework for SOA applications in mobile environment
By Johnneth Fonseca, Zair Abdelouahab, Denivaldo Lopes · ArXiv: 1004.0774
2010-07-15
0
Security properties in an open peer-to-peer network
By Jean-Francois Lal, e, David Rodriguez · ArXiv: 1004.0772
2010-07-15
0
Performance evaluation of a new route optimization technique for mobile IP
By Moheb R Girgis, Tarek M Mahmoud, Youssef S Takroni · ArXiv: 1004.0771
2010-07-15
0
Data security in mobile devices by geo locking
By M Prabu Kumar, K Praneesh Kumar Yadav (VIT University, India) · ArXiv: 1004.0770
2010-07-15
0
PSIM: A tool for analysis of device pairing methods
By Yasir Arfat Malkani, Lachhman Das Dhomeja (University of Sussex, Brighton · ArXiv: 1004.0769
2010-07-15
0
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
By Mohammed Aijaz Ahmed(1), D. Rajya Lakshmi(1), Sayed Abdul Sattar(2) ((1)GITAM University · ArXiv: 1004.0767
2010-07-15
0
Integrating identity-based cryptography in IMS service authentication
By ** - 논문에 명시된 저자 정보는 제공되지 않았습니다. (원문에 저자 리스트가 포함되지 않음) ** · ArXiv: 1004.0762
2010-07-15
0
Extended Two-Dimensional PCA for Efficient Face Representation and Recognition
By Mehran Safayani, Mohammad T. Manzuri-Shalmani, Mahmoud Khademi · ArXiv: 1004.0755
2010-04-07
0
Measuring and Synthesizing Systems in Probabilistic Environments
By Krishnendu Chatterjee, Thomas A. Henzinger, Barbara Jobstmann · ArXiv: 1004.0739
2011-04-15
0
Exact Ramsey Theory: Green-Tao numbers and SAT
By Oliver Kullmann · ArXiv: 1004.0653
2011-06-28
0
The Isomorphism Problem for omega-Automatic Trees
By Dietrich Kuske, Jiamou Liu, Markus Lohrey · ArXiv: 1004.0610
2010-04-06
0
Intelligent Detection System framework using Mobile agents
By N.Jaisankar(1), R.Saravanan(1), K. Durai Swamy(2) · ArXiv: 1004.0602
2010-07-15
0
Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks
By G.M.Tamilselvan, A.Shanmugam, (Bannariamman Institute of Technology · ArXiv: 1004.0596
2010-07-15
0
Dynamic IDP Signature processing by fast elimination using DFA
By Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ranjan Ghosh · ArXiv: 1004.0594
2010-07-15
0
A new key establishment scheme for wireless sensor networks
By Eric Ke Wang, Lucas C.K.Hui, S.M.Yiu · ArXiv: 1004.0591
2010-07-15
0
Iterative method for improvement of coding and decryption
By Natasa Zivic, (University of Siegen, Germany) · ArXiv: 1004.0590
2010-07-15
0
«« « 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 » »»