Computer Science

49942 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Labeled Natural Deduction Systems for a Family of Tense Logics
By Luca Vigan`o, Marco Volpe · ArXiv: 0803.3187
2008-03-25
0
On the Diversity-Multiplexing Tradeoff in Multiple-Relay Network
By Shahab Oveis Gharan, Alireza Bayesteh, Amir K. Kh · ArXiv: 0803.3117
2008-06-08
2
Concurrent Composition and Algebras of Events, Actions, and Processes
By Mark Burgin a, Marc L. Smith · ArXiv: 0803.3099
2008-03-24
0
Idiotypic Immune Networks in Mobile Robot Control
By Am, a Whitbrook, Uwe Aickelin · ArXiv: 0803.2981
2010-07-05
2
Rule Generalisation in Intrusion Detection Systems using Snort
By Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts · ArXiv: 0803.2973
2010-07-05
2
A Recommender System based on Idiotypic Artificial Immune Networks
By Steve Cayzer, Uwe Aickelin · ArXiv: 0803.2970
2010-07-05
0
On the Application of Hierarchical Coevolutionary Genetic Algorithms: Recombination and Evaluation Partners
By Uwe Aickelin, Larry Bull · ArXiv: 0803.2966
2010-07-05
1
An Indirect Genetic Algorithm for Set Covering Problems
By Uwe Aickelin · ArXiv: 0803.2965
2010-07-05
2
Locked constraint satisfaction problems
By Lenka Zdeborova, Marc Mezard · ArXiv: 0803.2955
2008-09-05
1
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
By Travis R. Beals, Barry C. S, ers · ArXiv: 0803.2919
2008-08-23
0
A Distance Metric for Tree-Sibling Time Consistent Phylogenetic Networks
By Gabriel Cardona, Merce Llabres, Francesc Rossello · ArXiv: 0803.2904
2008-03-21
0
Minimal weight expansions in Pisot bases
By Christiane Frougny (LIAFA), Wolfgang Steiner (LIAFA) · ArXiv: 0803.2874
2009-01-09
0
Figuring out Actors in Text Streams: Using Collocations to establish Incremental Mind-maps
By T. Rothenberger, S. Oez, E. Tahirovic · ArXiv: 0803.2856
2008-12-18
0
Admission Control to Minimize Rejections and Online Set Cover with Repetitions
By Noga Alon, Yossi Azar, Shai Gutner · ArXiv: 0803.2842
2008-12-18
0
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
By Mari Kobayashi, Xavier Mestre · ArXiv: 0803.2827
2008-03-20
0
Combined Intra- and Inter-domain Traffic Engineering using Hot-Potato Aware Link Weights Optimization
By Simon Balon, Guy Leduc · ArXiv: 0803.2824
2008-04-14
0
Distributed authentication for randomly compromised networks
By Travis R. Beals, Kevin P. Hynes, Barry C. S · ArXiv: 0803.2717
2009-08-27
0
Digital Ecosystems: Self-Organisation of Evolving Agent Populations
By Gerard Briscoe, Philippe De Wilde · ArXiv: 0803.2675
2009-10-05
0
Maximal Orders in the Design of Dense Space-Time Lattice Codes
By Camilla Hollanti, Jyrki Lahtonen, Hsiao-feng Francis Lu · ArXiv: 0803.2639
2016-11-17
0
Combinatorial realization of the Thom-Smale complex via discrete Morse theory
By Etienne Gallais (LMAM, LMJL) · ArXiv: 0803.2616
2008-12-18
0
Rapport de recherche sur le probl`eme du plus court chemin contraint
By Olivier Laval (LIPN), Sophie Toulouse (LIPN), Anass Nagih (LITA) · ArXiv: 0803.2615
2008-12-18
0
Unequal Error Protection: An Information Theoretic Perspective
By Shashi Borade, Baris Nakiboglu, Lizhong Zheng · ArXiv: 0803.2570
2020-01-03
1
Logical Queries over Views: Decidability and Expressiveness
By James Bailey, Guozhu Dong, Anthony Widjaja To · ArXiv: 0803.2559
2008-12-18
0
Adversarial Scheduling Analysis of Game Theoretic Models of Norm Diffusion
By Gabriel Istrate, Madhav V. Marathe, S.S.Ravi · ArXiv: 0803.2495
2008-11-04
0
Upper Bound on Error Exponent of Regular LDPC Codes Transmitted over the BEC
By Idan Goldenberg, David Burshtein · ArXiv: 0803.2460
2008-03-18
0
Trajectory Networks and Their Topological Changes Induced by Geographical Infiltration
By Luciano da Fontoura Costa · ArXiv: 0803.2447
2008-04-21
0
A General Rate Duality of the MIMO Multiple Access Channel and the MIMO Broadcast Channel
By Raphael Hunger, Michael Joham · ArXiv: 0803.2427
2016-11-15
0
CoSaMP: Iterative signal recovery from incomplete and inaccurate samples
By D. Needell, J. A. Tropp · ArXiv: 0803.2392
2014-04-29
1
SAFIUS - A secure and accountable filesystem over untrusted storage
By V Sriram, Ganesh Narayan, K Gopinath · ArXiv: 0803.2365
2016-11-18
0
lambda-Connectedness Determination for Image Segmentation
By Li Chen · ArXiv: 0803.2363
2008-03-18
0
«« « 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 » »»