Computer Science

54884 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Hiding Information in Retransmissions
By ** Wojciech Mazurczyk, Miłosz Smolarczyk, Krzysztof Szczypiorski – Warsaw University of Technology · ArXiv: 0905.0363
2009-05-14
0
Fuzzy Mnesors
By Gilles Champenois · ArXiv: 0905.0192
2009-05-05
0
Theoretical Analysis of Cyclic Frequency Domain Noise and Feature Detection for Cognitive Radio Systems
By Gan Xiaoying, Shan Da, Zhou Yuan · ArXiv: 0905.0024
2009-05-04
0
On the Algorithmic Complexity of the Mastermind Game with Black-Peg Results
By Michael T. Goodrich · ArXiv: 0904.4911
2009-05-13
1
Simulating reachability using first-order logic with applications to verification of linked data structures
By Tal Lev-Ami, Neil Immerman, Thomas Reps · ArXiv: 0904.4902
2015-07-01
0
On optimal precoding in linear vector Gaussian channels with arbitrary input distribution
By Miquel Payaro, Daniel P. Palomar · ArXiv: 0904.4900
2009-05-01
0
FaceBots: Steps Towards Enhanced Long-Term Human-Robot Interaction by Utilizing and Publishing Online Social Information
By ** - Nikolaos Mavridis* - Shervin Emami* - Ch, an Datta* - Wajahat Kazmi* - Chiraz BenAbdelkader† - Panos Toulis‡ - Andry Tanoto§ - Tamer Rabie* \* Interactive Robots, Media Lab · ArXiv: 0904.4836
2009-05-01
0
The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel
By Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Kh · ArXiv: 0904.4735
2009-04-30
0
Continuous Strategy Replicator Dynamics for Multi--Agent Learning
By Aram Galstyan · ArXiv: 0904.4717
2011-09-26
0
Evaluation of Martons Inner Bound for the General Broadcast Channel
By Amin Aminzadeh Gohari, Venkat Anantharam · ArXiv: 0904.4541
2011-05-31
0
Learning Character Strings via Mastermind Queries, with a Case Study Involving mtDNA
By Michael T. Goodrich · ArXiv: 0904.4458
2009-04-28
0
DNA-Inspired Information Concealing
By ** 논문 원문에 저자 정보가 명시되지 않아 제공할 수 없습니다. (원문에 포함된 경우 별도 확인 필요) ** · ArXiv: 0904.4449
2009-04-29
0
Opportunistic Spatial Orthogonalization and Its Application in Fading Cognitive Radio Networks
By Cong Shen, Michael P. Fitz · ArXiv: 0904.4283
2009-04-29
0
Fundamentals of the Backoff Process in 802.11: Dichotomy of the Aggregation
By ** - Jeong‑Woo Cho (J. Cho) – 당시 EPFL, 현재 NTNU (노르웨이) - Y. Jiang – Norwegian University of Science, Technology (NTNU) ** · ArXiv: 0904.4155
2010-08-23
0
On Constructor Rewrite Systems and the Lambda-Calculus (Long Version)
By Ugo Dal Lago, Simone Martini · ArXiv: 0904.4120
2012-08-03
1
Guarded resolution for answer set programming
By V. W. Marek, J. B. Remmel · ArXiv: 0904.3953
2009-04-25
0
Refutation of Aslams Proof that NP = P
By Frank Ferraro, Garrett Hall, Andrew Wood · ArXiv: 0904.3912
2009-05-15
0
On Capacity Computation for the Two-User Binary Multiple-Access Channel
By J. B"uhler, G. Wunder · ArXiv: 0904.3894
2009-04-30
23
Automated Epilepsy Diagnosis Using Interictal Scalp EEG
By Forrest Sheng Bao, Jue-Ming Gao, Jing Hu · ArXiv: 0904.3808
2009-04-27
0
Approximate Triangle Counting
By Charalampos E. Tsourakakis, Mihail N. Kolountzakis, Gary L. Miller · ArXiv: 0904.3761
2009-06-30
0
The h-Index of a Graph and its Application to Dynamic Subgraph Statistics
By David Eppstein, Emma S. Spiro · ArXiv: 0904.3741
2009-04-23
0
Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals
By Farzan Haddadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref · ArXiv: 0904.3642
2009-11-13
0
Tailored business solutions by workflow technologies
By Florin Fortis, Alex, ra Fortis · ArXiv: 0904.3634
2009-04-24
0
Termination of Linear Programs with Nonlinear Constraints
By Bican Xia, Zhihai Zhang · ArXiv: 0904.3588
2009-04-23
0
On using floating-point computations to help an exact linear arithmetic decision procedure
By David Monniaux · ArXiv: 0904.3525
2009-04-22
0
On the Complexity of Searching in Trees: Average-case Minimization
By Ferdin, o Cicalese, Tobias Jacobs · ArXiv: 0904.3503
2009-04-22
0
Comment to "Coverage by Randomly Deployed Wireless Sensor Networks"
By Bhupendra Gupta (Indian Institute of Information Technology-DM-Jabalpur) · ArXiv: 0904.3444
2009-04-23
0
A method for Hedging in continuous time
By Yoav Freund · ArXiv: 0904.3356
2009-10-14
0
Using Association Rules for Better Treatment of Missing Values
By Shariq Bashir, Saad Razzaq, Umer Maqbool · ArXiv: 0904.3320
2009-04-22
0
Ramp: Fast Frequent Itemset Mining with Efficient Bit-Vector Projection Technique
By Shariq Bashir, Abdul Rauf Baig · ArXiv: 0904.3316
2009-04-22
0
«« « 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 » »»