Computer Science

52184 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Efficient methodology for implementation of Encrypted File System in User Space
By Dr. Shishir Kumar, U.S. Rawat, Sameer Kumar Jasra · ArXiv: 0908.0551
2009-08-06
0
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network
By ** - **Hanumanthappa J.** – Department of Computer Science, University of Mysore, India (hanums_j@yahoo.com) - **Dr. Manjaiah D.H.** – Department of Computer Science · ArXiv: 0908.0548
2009-08-06
0
REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P != NP
By Shenghui Su, Shuwang Lu · ArXiv: 0908.0482
2014-08-27
1
Data management in systems biology I - Overview and bibliography
By Gerhard Mayer · ArXiv: 0908.0411
2009-12-15
0
On Bijective Variants of the Burrows-Wheeler Transform
By Manfred Kufleitner · ArXiv: 0908.0239
2009-08-04
0
An Improvement of Cover/El Gamals Compress-and-Forward Relay Scheme
By Liang-Liang Xie · ArXiv: 0908.0163
2009-08-15
0
Intelligent Advisory System for Supporting University Managers in Law
By ** - **A. E. E. ElAlfi** – 컴퓨터과학부, Mansoura University, Egypt (이메일: Ael_Alfi@yahoo.com) - **M. E. ElAlami** – 컴퓨터과학부 · ArXiv: 0908.0124
2009-08-04
0
Knowledge Discovery of Hydrocyclone s Circuit Based on SONFIS and SORST
By H. O. Ghaffari, M. Ejtemaei, M. Irannajad · ArXiv: 0908.0089
2009-08-04
0
A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security
By ** - Manas Paul (Sr. Lecturer, Dept. of Computer Application, JIS College of Engineering · ArXiv: 0908.0080
2009-08-04
1
On Random Construction of a Bipolar Sensing Matrix with Compact Representation
By Tadashi Wadayama · ArXiv: 0908.0045
2009-08-01
0
Convergence of Expected Utility for Universal AI
By Peter de Blanc · ArXiv: 0907.5598
2009-07-31
0
A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks
By B.Narasimhan, S.Santhosh baboo · ArXiv: 0907.5441
2009-08-03
0
Efficient Web Log Mining using Doubly Linked Tree
By Ratnesh Kumar Jain, Dr. R. S. Kasana, Dr. Suresh Jain · ArXiv: 0907.5433
2009-08-03
0
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic
By Juan Jose Jaramillo, R. Srikant · ArXiv: 0907.5402
2009-12-13
0
Speedup in the Traveling Repairman Problem with Unit Time Windows
By ** Greg N. Frederickson, Barry Wittman ** · ArXiv: 0907.5372
2009-07-31
0
Recursive Random Number Generator Using Prime Reciprocals
By Subhash Kak · ArXiv: 0907.5226
2009-07-31
0
Interference alignment-based sum capacity bounds for random dense Gaussian interference networks
By Oliver Johnson, Matthew Aldridge, Robert Piechocki · ArXiv: 0907.5165
2011-09-12
0
On Classification from Outlier View
By Refer to original PDF · ArXiv: 0907.5155
2012-01-04
0
Cutwidth and degeneracy of graphs
By Benoit Kloeckner (IF) · ArXiv: 0907.5138
2010-11-01
0
Restart Strategy Selection using Machine Learning Techniques
By Shai Haim, Toby Walsh · ArXiv: 0907.5032
2009-07-30
0
Living at the Edge: A Large Deviations Approach to the Outage MIMO Capacity
By P. Kazakopoulos, P. Mertikopoulos, A. L. Moustakas · ArXiv: 0907.5024
2016-11-18
0
Cooperative Jamming for Wireless Physical Layer Security
By Lun Dong, Zhu Han, Athina P. Petropulu · ArXiv: 0907.4996
2009-07-30
0
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption
By R.K.Pateriya, J.L.Rana, S.C. Shrivastava · ArXiv: 0907.4994
2009-07-30
0
Using the Physical Layer for Wireless Authentication in Time-Variant Channels
By Liang Xiao, Larry Greenstein, Narayan M · ArXiv: 0907.4919
2016-11-18
0
Growth Rate of the Weight Distribution of Doubly-Generalized LDPC Codes: General Case and Efficient Evaluation
By Mark F. Flanagan, Enrico Paolini, Marco Chiani · ArXiv: 0907.4885
2016-11-18
0
Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe
By Vipin M, Mohamed Imran K R · ArXiv: 0907.4881
2009-07-29
0
Distributed MIMO radar using compressive sampling
By Athina P. Petropulu, Yao Yu, H. Vincent Poor · ArXiv: 0907.4653
2009-07-28
0
Full abstraction for nominal general references
By Nikos Tzevelekos · ArXiv: 0907.4477
2015-07-01
0
Graphical Probabilistic Routing Model for OBS Networks with Realistic Traffic Scenario
By Martin Levesque, Halima Elbiaze · ArXiv: 0907.4447
2009-07-28
0
On the Duality of Probing and Fault Attacks
By Berndt M. Gammel, Stefan Mangard · ArXiv: 0907.4273
2009-07-27
0
«« « 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 » »»