Computer Science

52922 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Outward Accessibility in Urban Street Networks: Characterization and Improvements
By Bruno Augusto Nassif Travenc{c}olo, Luciano da Fontoura Costa · ArXiv: 0802.3665
2008-02-26
0
Local Information Based Algorithms for Packet Transport in Complex Networks
By ** Bernard Kujawski, G.J. Rodgers, Bosiljka Tadić ** · ArXiv: 0802.3634
2008-02-26
0
Clusters of solutions and replica symmetry breaking in random k-satisfiability
By Andrea Montanari, Federico Ricci-Tersenghi, Guilhem Semerjian · ArXiv: 0802.3627
2009-11-13
0
Color Graphs: An Efficient Model For Two-Dimensional Cellular Automata Linear Rules
By Birendra Kumar Nayak, Sudhakar Sahoo, Sushant Kumar Rout · ArXiv: 0802.3626
2008-02-28
0
Towards a formalization of budgets
By Jan A. Bergstra, Sanne Nolst Trenite, Mark B. van der Zwaag · ArXiv: 0802.3617
2008-02-26
1
Power Allocation for Fading Channels with Peak-to-Average Power Constraints
By Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K. Rasmussen · ArXiv: 0802.3611
2008-02-26
0
Asymptotic Behaviour of Random Vandermonde Matrices with Entries on the Unit Circle
By {O}yvind Ryan, Merouane Debbah · ArXiv: 0802.3570
2016-08-14
0
Distributed Sensor Localization in Random Environments using Minimal Number of Anchor Nodes
By Usman A. Khan, Soummya Kar, Jose M. F. Moura · ArXiv: 0802.3563
2013-12-19
0
Data Traffic Dynamics and Saturation on a Single Link
By ** Reginald D. Smith ** · ArXiv: 0802.3554
2011-12-08
0
Approximate Capacity of Gaussian Relay Networks
By Amir Salman Avestimehr, Suhas N. Diggavi, David N C. Tse · ArXiv: 0802.3535
2016-11-17
0
The Complexity of Node Blocking for Dags
By ** Dariusz Dereniowski (Gdańsk University of Technology, Pol, ) – 이메일: `deren@eti.pg.gda.pl` --- ** · ArXiv: 0802.3513
2021-03-05
0
Gaussian Interference Networks: Sum Capacity in the Low Interference Regime and New Outer Bounds on the Capacity Region
By V. Sreekanth Annapureddy, Venugopal V. Veeravalli · ArXiv: 0802.3495
2009-02-15
0
On capacity of wireless ad hoc networks with MIMO MMSE receivers
By Jing Ma, Ying Jun Zhang · ArXiv: 0802.3490
2008-02-26
0
An Empirical Study of End-User Behaviour in Spreadsheet Error Detection & Correction
By Brian Bishop, Kevin McDaid · ArXiv: 0802.3479
2008-03-10
0
Fun Boy Three Were Wrong: it is what you do, not the way that you do it
By Jocelyn Paine · ArXiv: 0802.3476
2008-03-10
0
Spreadsheet Development Methodologies using Resolver: Moving spreadsheets into the 21st Century
By Patrick Kemmis, Giles Thomas · ArXiv: 0802.3475
2008-03-10
0
On Cobweb Posets and Discrete F-Boxes Tilings
By M. Dziemianczuk · ArXiv: 0802.3473
2009-04-02
0
Sketch-Based Estimation of Subpopulation-Weight
By Edith Cohen, Haim Kaplan · ArXiv: 0802.3448
2008-02-26
0
Automatic Verification of Correspondences for Security Protocols
By Bruno Blanchet · ArXiv: 0802.3444
2008-02-26
0
On Cusick-Cheons Conjecture About Balanced Boolean Functions in the Cosets of the Binary Reed-Muller Code
By Yuri L. Borissov · ArXiv: 0802.3437
2008-04-14
0
A Class of Nonbinary Codes and Their Weight Distribution
By Xiangyong Zeng, Nian Li, Lei Hu · ArXiv: 0802.3430
2008-02-26
0
Randomized Frameproof Codes: Fingerprinting Plus Validation Minus Tracing
By N. Prasanth Anthapadmanabhan, Alex, er Barg · ArXiv: 0802.3419
2008-02-26
0
On the Structure of the Capacity Region of Asynchronous Memoryless Multiple-Access Channels
By Ninoslav Marina, Bixio Rimoldi · ArXiv: 0802.3401
2016-11-17
0
PVM-Distributed Implementation of the Radiance Code
By Francisco R. Villatoro, Antonio J. Nebro, Jose E. Fern · ArXiv: 0802.3355
2008-02-25
0
An Algebraic Characterization of Security of Cryptographic Protocols
By Manas K Patra, Yan Zhang · ArXiv: 0802.3328
2008-02-25
0
Use of Rapid Probabilistic Argumentation for Ranking on Large Complex Networks
By Burak Cetin, Haluk Bingol · ArXiv: 0802.3293
2008-02-25
0
Turan Graphs, Stability Number, and Fibonacci Index
By - **Véronique Bruyère** (Université de Mons‑Hainaut, 벨기에) - **Hadrien Mélot** (Université de Mons‑Hainaut, 벨기에) · ArXiv: 0802.3284
2024-03-11
0
An integrated model of traffic, geography and economy in the Internet
By Petter Holme, Josh Karlin, Stephanie Forrest · ArXiv: 0802.3283
2008-06-25
0
General Algorithms for Testing the Ambiguity of Finite Automata
By Cyril Allauzen, Mehryar Mohri, Ashish Rastogi · ArXiv: 0802.3254
2008-02-25
0
On the Capacity and Design of Limited Feedback Multiuser MIMO Uplinks
By Il Han Kim, David J. Love · ArXiv: 0802.3253
2008-02-25
0
«« « 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 » »»