Computer Science

55729 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design
By Niranjan Srinivas, Andreas Krause, Sham M. Kakade · ArXiv: 0912.3995
2015-03-13
1
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
By Hamid.A.Jalab, A.A Zaidan, B.B Zaidan · ArXiv: 0912.3986
2009-12-22
0
New Model of Network- a Future Aspect of the Computer Networks
By Ram Kumar Singh, T. Ramajujam · ArXiv: 0912.3985
2009-12-22
0
Performance Analysis of AIM-K-means & K-means in Quality Cluster Generation
By Samarjeet Borah, Mrinal Kanti Ghose · ArXiv: 0912.3983
2009-12-22
0
Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP
By Jamal A. Hussein, Mumtaz A. AlMukhtar · ArXiv: 0912.3980
2009-12-22
0
Penetration Testing: A Roadmap to Network Security
By Nitin A. Naik, Gajanan D. Kurundkar, Santosh D. Khamitkar · ArXiv: 0912.3970
2009-12-26
0
Towards Expeditious and Unswerving Routing to Corroborate Nascent Internet
By Shishir Kumar, Mahesh Kumar · ArXiv: 0912.3966
2009-12-22
0
Fast Fraction-Integer Method for Computing Multiplicative Inverse
By Hani M. AL-Matari, Sattar J. Aboud, Nidal F. Shilbayeh · ArXiv: 0912.3963
2009-12-22
0
Logarithmic Barrier Optimization Problem Using Neural Network
By A. K. Ojha, C. Mallick, D. Mallick · ArXiv: 0912.3927
2009-12-22
0
Application of Radial Basis Network Model for HIV/AIDs Regimen Specifications
By P. Balasubramanie, M. Lilly Florence · ArXiv: 0912.3926
2009-12-22
0
A Simplified Proof For The Application Of Freivalds Technique to Verify Matrix Multiplication
By Vamsi K. Kundeti · ArXiv: 0912.3925
2010-03-17
0
Design of an Automated Intrusion Detection System incorporating an Alarm
By Awodele Oludele, Ogunnusi Ayodele, Omole Oladele · ArXiv: 0912.3921
2009-12-22
0
High-performance Energy Minimization with Applications to Adiabatic Quantum Computing
By Hector J. Garcia, Igor L. Markov · ArXiv: 0912.3912
2013-06-20
0
Sharp utilization thresholds for some real-time scheduling problems
By Sathish Gopalakrishnan · ArXiv: 0912.3852
2009-12-22
0
On uniform sampling simple directed graph realizations of degree sequences
By M. Drew Lamar · ArXiv: 0912.3834
2009-12-22
0
Highly accelerated simulations of glassy dynamics using GPUs: caveats on limited floating-point precision
By Peter H. Colberg, Felix H"ofling · ArXiv: 0912.3824
2011-04-08
0
The complexity of the list homomorphism problem for graphs
By Laszlo Egri, Andrei Krokhin, Benoit Larose · ArXiv: 0912.3802
2010-02-03
0
On the circuit-size of inverses
By Jean-Camille Birget · ArXiv: 0912.3730
2011-02-25
0
Belief propagation for graph partitioning
By P. Sulc, L. Zdeborova · ArXiv: 0912.3563
2010-06-16
0
A simple and efficient explicit parallelization of logic programs using low-level threading primitives
By Diptikalyan Saha, Paul Fodor · ArXiv: 0912.3510
2009-12-28
0
On Space-Time Capacity Limits in Mobile and Delay Tolerant Networks
By Philippe Jacquet, Bernard Mans, Georgios Rodolakis · ArXiv: 0912.3441
2016-11-18
0
Decidability of the interval temporal logic ABBar over the natural numbers
By A. Montanari, G. Puppis, P. Sala · ArXiv: 0912.3429
2010-02-03
0
Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts
By David Kempe, Mahyar Salek, Cristopher Moore · ArXiv: 0912.3310
2011-06-14
0
New Generalization Bounds for Learning Kernels
By Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh · ArXiv: 0912.3309
2009-12-18
0
Derandomizing from Random Strings
By Harry Buhrman, Lance Fortnow, Michal Koucky · ArXiv: 0912.3162
2009-12-17
0
Investment and Pricing with Spectrum Uncertainty: A Cognitive Operators Perspective
By Lingjie Duan, Jianwei Huang, Biying Shou · ArXiv: 0912.3089
2016-11-15
0
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
By Chengqing Li, Shujun Li, Kwok-Tung Lo · ArXiv: 0912.3050
2009-12-21
0
Graph unique-maximum and conflict-free colorings
By Panagiotis Cheilaris, Geza Toth · ArXiv: 0912.3004
2009-12-17
0
Set Systems and Families of Permutations with Small Traces
By Otfried Cheong (KAIST), Xavier Goaoc (INRIA Lorraine - LORIA), Cyril Nicaud (IGM) · ArXiv: 0912.2979
2009-12-17
0
Multi-valued Action Languages in CLP(FD)
By Agostino Dovier, Andrea Formisano, Enrico Pontelli · ArXiv: 0912.2846
2009-12-16
0
«« « 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 » »»