Computer Science

49942 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Prediciendo el generador cuadratico (in Spanish)
By ** Domingo Gómez‑Pérez, Jaime Gutiérrez, Álvar Ibeas · ArXiv: 0804.1788
2008-04-11
0
Phutball is PSPACE-hard
By **Dariusz Dereniowski** – Department of Algorithms, System Modeling, Gdańsk University of Technology · ArXiv: 0804.1777
2021-03-05
1
The Choquet integral for the aggregation of interval scales in multicriteria decision making
By Christophe Labreuche (TRT), Michel Grabisch (LIP6) · ArXiv: 0804.1762
2008-12-18
0
Noncoherent Capacity of Underspread Fading Channels
By Giuseppe Durisi, Ulrich G. Schuster, Helmut B"olcskei · ArXiv: 0804.1748
2016-11-15
0
On affine usages in signal-based communication
By Roberto Amadio (PPS), Mehdi Dogguy (PPS) · ArXiv: 0804.1729
2010-07-01
0
Information Acquisition and Exploitation in Multichannel Wireless Networks
By Sudipto Guha, Kamesh Munagala, Saswati Sarkar · ArXiv: 0804.1724
2008-04-11
0
Lower Bounds on the Rate-Distortion Function of Individual LDGM Codes
By Shrinivas Kudekar, Ruediger Urbanke · ArXiv: 0804.1697
2008-04-11
0
A classification of invasive patterns in AOP
By Freddy Munoz (IRISA), Benoit Baudry (IRISA), Olivier Barais (IRISA) · ArXiv: 0804.1696
2009-04-20
0
Subclose Families, Threshold Graphs, and the Weight Hierarchy of Grassmann and Schubert Codes
By Sudhir R. Ghorpade, Arunkumar R. Patil, Harish K. Pillai · ArXiv: 0804.1669
2009-11-06
0
Mechanizing the Metatheory of LF
By Christian Urban, James Cheney, Stefan Berghofer · ArXiv: 0804.1667
2010-05-04
0
Nonextensive Generalizations of the Jensen-Shannon Divergence
By Andre Martins, Pedro Aguiar, Mario Figueiredo · ArXiv: 0804.1653
2008-04-11
0
Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
By Rui Zhang · ArXiv: 0804.1617
2009-02-17
0
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models
By S. Sundhar Ram, V. V. Veeravalli, A. Nedic · ArXiv: 0804.1607
2008-04-12
0
Distributed Space Time Codes for the Amplify-and-Forward Multiple-Access Relay Channel
By Maya Badr, Jean-Claude Belfiore · ArXiv: 0804.1493
2008-04-10
3
Distributed Space-Time Block Codes for the MIMO Multiple Access Channel
By Maya Badr, Jean-Claude Belfiore · ArXiv: 0804.1490
2008-04-10
0
Fast k Nearest Neighbor Search using GPU
By Vincent Garcia, Eric Debreuve, Michel Barlaud · ArXiv: 0804.1448
2008-04-10
0
On Kernelization of Supervised Mahalanobis Distance Learners
By Ratthachat Chatpatanasiri, Teesid Korsrilabutr, Pasakorn Tangchanachaianan · ArXiv: 0804.1441
2009-01-30
0
Adversary lower bounds for nonadaptive quantum algorithms
By Pacal Koiran (LIP), J"urgen L, es · ArXiv: 0804.1440
2008-12-18
0
The Geometry of Interaction of Differential Interaction Nets
By Marc de Falco · ArXiv: 0804.1435
2008-04-10
0
A $O(log m)$, deterministic, polynomial-time computable approximation of Lewis Carrolls scoring rule
By Jason Covey, Christopher Homan · ArXiv: 0804.1421
2008-12-18
0
Discovering More Accurate Frequent Web Usage Patterns
By Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar · ArXiv: 0804.1409
2008-12-18
0
Interference-Assisted Secret Communication
By Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic · ArXiv: 0804.1382
2016-11-17
0
Scale-free networks as preasymptotic regimes of superlinear preferential attachment
By Paul Krapivsky, Dmitri Krioukov · ArXiv: 0804.1366
2008-08-23
0
Asymptotic behavior of growth functions of D0L-systems
By Julien Cassaigne, Christian Mauduit, Francois Nicolas · ArXiv: 0804.1327
2009-09-13
0
Bolasso: model consistent Lasso estimation through the bootstrap
By Francis Bach (INRIA Rocquencourt) · ArXiv: 0804.1302
2008-12-18
0
Data Reduction in Intrusion Alert Correlation
By Gianni Tedesco, Uwe Aickelin · ArXiv: 0804.1281
2010-07-05
0
The quest for rings on bipolar scales
By Michel Grabisch (LIP6), Bernard De Baets, Janos Fodor · ArXiv: 0804.1270
2008-12-18
0
Immune System Approaches to Intrusion Detection - A Review
By Jungwon Kim, Peter J. Bentley, Uwe Aickelin · ArXiv: 0804.1266
2010-07-05
0
Geometric Data Analysis, From Correspondence Analysis to Structured Data Analysis (book review)
By Fionn Murtagh · ArXiv: 0804.1244
2011-06-14
0
New Lower Bounds for the Maximum Number of Runs in a String
By Kazuhiko Kusano, Wataru Matsubara, Akira Ishino · ArXiv: 0804.1214
2008-12-18
0
«« « 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 » »»