Computer Science

57402 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
SENVM: Server Environment Monitoring and Controlling System for a Small Data Center Using Wireless Sensor Network
By Supasate Choochaisri, Vit Niennattrakul, Saran Jenjaturong · ArXiv: 1105.6160
2011-06-01
0
Opportunistic Information Dissemination in Mobile Ad-hoc Networks: adaptiveness vs. obliviousness and randomization vs. determinism
By Martin Farach-Colton, Antonio Fern, ez Anta · ArXiv: 1105.6151
2011-06-01
0
Overcoming Misleads In Logic Programs by Redefining Negation
By M. A. El-Dosuky, T. T. Hamza, M. Z. Rashad · ArXiv: 1105.6148
2013-03-06
0
Maximum lilkelihood estimation in the $beta$-model
By Aless, ro Rinaldo, Sonja Petrovic · ArXiv: 1105.6145
2013-06-19
0
MDA based-approach for UML Models Complete Comparison
By Samia Benabdellah Chaouni, Mounia Fredj, Salma Mouline · ArXiv: 1105.6128
2011-06-01
0
Reasoning on Interval and Point-based Disjunctive Metric Constraints in Temporal Contexts
By F. Barber · ArXiv: 1105.6124
2011-06-01
0
RASID: A Robust WLAN Device-free Passive Motion Detection System
By Ahmed E. Kosba, Ahmed Saeed, Moustafa Youssef · ArXiv: 1105.6084
2012-02-14
0
Delay Optimal Event Detection on Ad Hoc Wireless Sensor Networks
By Premkumar Karumbu, Venkata K. Prasanthi M., Anurag Kumar · ArXiv: 1105.6065
2016-11-18
0
Distributed Detection/Isolation Procedures for Quickest Event Detection in Large Extent Wireless Sensor Networks
By Premkumar Karumbu, Anurag Kumar, Joy Kuri · ArXiv: 1105.6061
2011-07-19
0
The Perceptron with Dynamic Margin
By Constantinos Panagiotakopoulos, Petroula Tsampouka · ArXiv: 1105.6041
2011-05-31
0
Optimum Sleep-Wake Scheduling of Sensors for Quickest Event Detection in Small Extent Wireless Sensor Networks
By Premkumar Karumbu, Anurag Kumar · ArXiv: 1105.6024
2011-05-31
0
Synchronous Control of Reconfiguration in Fractal Component-based Systems -- a Case Study
By Tayeb Bouhadiba (INRIA Grenoble Rh^one-Alpes / LIG Laboratoire dInformatique de Grenoble), Quentin Sabah (INRIA Grenoble Rh^one-Alpes / LIG Laboratoire dInformatique de Grenoble), Gwena"el Delaval (INRIA Grenoble Rh^one-Alpes / LIG Laboratoire dInformatique de Grenoble) · ArXiv: 1105.6010
2011-06-07
0
A Modeling Framework for Gossip-based Information Spread
By Rena Bakhshi, Daniela Gavidia, Wan Fokkink · ArXiv: 1105.5986
2011-05-31
0
A Polynomial Time Approximation Algorithm for the Two-Commodity Splittable Flow Problem
By Elke Eisenschmidt, Utz-Uwe Haus · ArXiv: 1105.5979
2011-11-22
0
The Cell Probe Complexity of Dynamic Range Counting
By Kasper Green Larsen · ArXiv: 1105.5933
2012-08-28
0
Algorithms for the minimum non-separating path and the balanced connected bipartition problems on grid graphs (With erratum)
By Bang Ye Wu · ArXiv: 1105.5915
2014-02-11
0
Regular realizability problems and models of a generalized nondeterminism
By A. Rubtsov, M. Vyalyi · ArXiv: 1105.5894
2015-03-19
0
Efficient sampling of high-dimensional Gaussian fields: the non-stationary / non-sparse case
By F. Orieux, O. Feron, J.-F. Giovannelli · ArXiv: 1105.5887
2011-05-31
0
Robot Networks with Homonyms: The Case of Patterns Formation
By Zohir Bouzid (LIP6), Anissa Lamani (MIS) · ArXiv: 1105.5817
2011-05-31
0
SOBA: Secrecy-preserving Observable Ballot-level Audit
By Josh Benaloh, Douglas Jones, Eric Lazarus · ArXiv: 1105.5803
2011-07-05
0
A Philosophical Treatise of Universal Induction
By Samuel Rathmanner, Marcus Hutter · ArXiv: 1105.5721
2015-05-28
0
Relational Schema Protocol (RSP)
By Vojtech Prehnal · ArXiv: 1105.5718
2011-05-31
0
Towards High-Performance Network Application Identification With Aggregate-Flow Cache
By Fei He, Fan Xiang, Yibo Xue · ArXiv: 1105.5684
2011-05-31
0
Improving Anonymity in Shared Key Primitives Based on Perfect Hash Families
By Mausumi Bose, Rahul Mukerjee · ArXiv: 1105.5681
2011-05-31
0
Complexity of and Algorithms for Borda Manipulation
By Jessica Davies, George Katsirelos, Nina Narodytska · ArXiv: 1105.5667
2011-05-31
0
High Quality of Service on Video Streaming in P2P Networks using FST-MDC
By Suresh Jaganathan, Jeevan Eranti · ArXiv: 1105.5641
2011-05-31
0
A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks
By Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma · ArXiv: 1105.5623
2011-05-30
1
Context Awarw Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks
By Abhijit Sarma, Shantanu Joshi, Sukumar N · ArXiv: 1105.5563
2011-05-30
0
A Frequency-domain Compensation Scheme for IQ-Imbalance in OFDM Receivers
By Shu Feng, Wang Mao, Shi Xiajie · ArXiv: 1105.5553
2011-06-22
0
Monte Carlo Algorithms for the Partition Function and Information Rates of Two-Dimensional Channels
By Mehdi Molkaraie, Hans-Andrea Loeliger · ArXiv: 1105.5542
2012-12-27
0
«« « 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 » »»