Computer Science

55518 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Spanning directed trees with many leaves
By N Alon, F.V. Fomin, G. Gutin · ArXiv: 0803.0701
2008-03-06
0
Towards an Optimal Separation of Space and Length in Resolution
By Jakob Nordstr"om, Johan H{aa}stad · ArXiv: 0803.0661
2009-09-29
0
Aggregating and Deploying Network Access Control Policies
By Joaquin Garcia-Alfaro, Frederic Cuppens, Nora Cuppens-Boulahia · ArXiv: 0803.0653
2008-12-18
0
Network Coding for Distributed Storage Systems
By Alex, ros G. Dimakis, P. Brighten Godfrey · ArXiv: 0803.0632
2008-03-06
3
Cooperative Spectrum Sensing Using Random Matrix Theory
By L. S. Cardoso, M. Debbah, P. Bianchi · ArXiv: 0803.0597
2008-03-06
0
Une approche modulaire probabiliste pour le routage `a Qualite de Service integree
By Said Hoceini (LISSI - Ea 3956), Abdelhamid Mellouk (LISSI - Ea 3956), Hayet Hafi (LISSI - Ea 3956) · ArXiv: 0803.0528
2008-12-18
0
Fast unfolding of communities in large networks
By Vincent D. Blondel, Jean-Loup Guillaume, Renaud Lambiotte · ArXiv: 0803.0476
2008-12-01
4
Stream sampling for variance-optimal estimation of subset sums
By Edith Cohen, Nick Duffield, Haim Kaplan · ArXiv: 0803.0473
2010-11-16
0
Zero-Forcing Precoding for Frequency Selective MIMO Channels with $H^infty$ Criterion and Causality Constraint
By S, er Wahls, Holger Boche · ArXiv: 0803.0428
2009-05-12
3
The Complexity of Testing Properties of Simple Games
By Josep Freixas, Xavier Molinero, Martin Olsen · ArXiv: 0803.0404
2008-03-05
0
Thread algebra for poly-threading
By J. A. Bergstra, C. A. Middelburg · ArXiv: 0803.0378
2011-06-17
0
Blind Fingerprinting
By Ying Wang, Pierre Moulin · ArXiv: 0803.0265
2008-03-04
2
Networks become navigable as nodes move and forget
By Augustin Chaintreau, Pierre Fraigniaud, Emmanuelle Lebhar · ArXiv: 0803.0248
2008-03-04
2
Self-Stabilizing Pulse Synchronization Inspired by Biological Pacemaker Networks
By Ariel Daliot, Danny Dolev, Hanna Parnas · ArXiv: 0803.0241
2008-03-04
0
Random hypergraphs and algorithmics
By Tsiriniaina Andriamampianina · ArXiv: 0803.0225
2008-06-20
0
Quiescence of Self-stabilizing Gossiping among Mobile Agents in Graphs
By Toshimitsu Masuzawa, Sebastien Tixeuil (LIP6, INRIA Futurs) · ArXiv: 0803.0189
2008-12-18
0
Considering Functional Spreadsheet Operator Usage Suggests the Value of Example Driven Modelling for Decision Support Systems
By Simon Thorne, David Ball · ArXiv: 0803.0164
2008-03-10
1
Towards a Spreadsheet Engineering
By V.R. Vemula, David Ball, Simon Thorne · ArXiv: 0803.0159
2008-03-10
0
Polynomial time algorithms for bi-criteria, multi-objective and ratio problems in clustering and imaging. Part I: Normalized cut and ratio regions
By Dorit S. Hochbaum · ArXiv: 0803.0146
2010-10-12
0
On disjoint matchings in cubic graphs
By Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N. Vardanyan · ArXiv: 0803.0134
2010-03-17
0
A compact topology for sand automata
By Alberto Dennunzio (DISCo), Pierre Guillon (IGM), Beno^it Masson (LIF) · ArXiv: 0803.0055
2008-12-18
0
Mobile Agents for Content-Based WWW Distributed Image Retrieval
By Sabu M. Thampi, K. Ch, ra Sekaran · ArXiv: 0803.0053
2008-03-04
1
A Bit-Compatible Shared Memory Parallelization for ILU(k) Preconditioning and a Bit-Compatible Generalization to Distributed Memory
By Xin Dong, Gene Cooperman · ArXiv: 0803.0048
2011-05-13
1
One-Time Pad, Arithmetic Coding and Logic Gates: An unifying theme using Dynamical Systems
By Nithin Nagaraj, Prabhakar G. Vaidya · ArXiv: 0803.0046
2008-03-04
0
A Survey on Deep Packet Inspection for Intrusion Detection Systems
By Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang · ArXiv: 0803.0037
2008-03-04
1
Composition Attacks and Auxiliary Information in Data Privacy
By Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam Smith · ArXiv: 0803.0032
2008-12-18
0
Another approach to decide on real root existence for univariate Polynomials, and a multivariate extension for 3-SAT
By Deepak Ponvel Chermakani · ArXiv: 0803.0018
2008-09-05
0
Automated Termination Proofs for Logic Programs by Term Rewriting
By P. Schneider-Kamp, J. Giesl, A. Serebrenik · ArXiv: 0803.0014
2008-09-01
2
Low Complexity Sphere Decoding for Spatial Multiplexing MIMO
By Vadim Neder, Doron Ezri, Motti Haridim · ArXiv: 0802.4390
2008-03-03
0
Role of Symmetry and Geometry in a chaotic Pseudo-Random Bit Generator
By Carmen Pellicer-Lostao, Ricardo Lopez-Ruiz · ArXiv: 0802.4350
2008-03-03
0
«« « 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 » »»