Computer Science

51219 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Formal Aspects of Grid Brokering
By Attila Kertesz (MTA Sztaki), Zsolt Nemeth (MTA Sztaki) · ArXiv: 0912.2549
2009-12-15
0
Towards Utility-driven Anonymization of Transactions
By Grigorios Loukides, Aris Gkoulalas-Divanis, Bradley Malin · ArXiv: 0912.2548
2010-01-26
0
Adapting Heuristic Mastermind Strategies to Evolutionary Algorithms
By Tomas Philip Runarsson, Juan J. Merelo-Guervos · ArXiv: 0912.2415
2009-12-15
0
Succinct Coverage Oracles
By Ioannis Antonellis, Anish Das Sarma, Shaddin Dughmi · ArXiv: 0912.2404
2010-04-09
0
Closing the Learning-Planning Loop with Predictive State Representations
By Byron Boots, Sajid M. Siddiqi, Geoffrey J. Gordon · ArXiv: 0912.2385
2009-12-15
0
Faster Algorithms for Finding and Counting Subgraphs
By Fedor V. Fomin, Daniel Lokshtanov, Venkatesh Raman · ArXiv: 0912.2371
2009-12-15
0
Identifying the Importance of Software Reuse in COCOMO81, COCOMOII
By CH.V.M.K.Hari, Prof. Prasad Reddy P.V.G.D, J.N.V.R Swarup Kumar · ArXiv: 0912.2320
2009-12-14
0
Steganography An Art of Hiding Data
By Shashikala Channalli, Ajay Jadhav · ArXiv: 0912.2319
2009-12-14
0
Early Detection of Breast Cancer using SVM Classifier Technique
By Y.Ireaneus Anna Rejani, S.Thamarai Selvi · ArXiv: 0912.2314
2009-12-14
0
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries
By Nasir Mahmood Malik, Tehmina Khalil, Samina Khalid · ArXiv: 0912.2306
2009-12-14
0
Survey of clustering algorithms for MANET
By Ratish Agarwal, Dr. Mahesh Motwani · ArXiv: 0912.2303
2009-12-14
0
Synthesis of supervised classification algorithm using intelligent and statistical tools
By Ali Douik, Mourad Moussa Jlassi · ArXiv: 0912.2302
2009-12-14
0
Performance Metrics Analysis of Torus Embedded Hypercube Interconnection Network
By N. Gopalakrishna Kini, M. Sathish Kumar, H.S. Mruthyunjaya · ArXiv: 0912.2298
2009-12-14
0
A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks
By S.Ayyasamy, S.N. Sivan, am · ArXiv: 0912.2296
2009-12-14
0
Detection and Prevention of New and Unknown Malware using Honeypots
By Shishir Kumar, Durgesh Pant · ArXiv: 0912.2293
2009-12-14
2
Evaluation of Varrying Mobility Models & Network Loads on DSDV Protocol of MANETs
By C.P.Agrawal, O.P.Vyas, M.K Tiwari · ArXiv: 0912.2284
2009-12-14
0
Design of Intelligent layer for flexible querying in databases
By Mrs. Neelu Nihalani, Dr. Sanjay Silakari, Dr. Mahesh Motwani · ArXiv: 0912.2282
2009-12-14
0
Computing a Discrete Logarithm in O(n^3)
By ** *논문에 저자 정보가 명시되어 있지 않음.* ** · ArXiv: 0912.2269
2009-12-29
0
The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack
By Mauro Conti, Roberto Di Pietro, Andrea Gabrielli · ArXiv: 0912.2199
2016-09-08
0
Matrix Graph Grammars: Transformation of Restrictions
By Pedro Pablo Perez Velasco · ArXiv: 0912.2160
2009-12-14
0
Effective Carrier Sensing in CSMA Networks under Cumulative Interference
By Liqun Fu, Soung Chang Liew, Jianwei Huang · ArXiv: 0912.2138
2009-12-14
0
Dispersion in disks
By Adrian Dumitrescu, Minghui Jiang · ArXiv: 0912.2125
2015-03-13
0
Efficient Gaussian Elimination on a 2D SIMD Array of Processors without Column Broadcasts
By Mugurel Ionut Andreica · ArXiv: 0912.2047
2009-12-11
0
An L(1/3) algorithm for ideal class group and regulator computation in certain number fields
By Jean-Franc{c}ois Biasse (LIX, INRIA Bordeaux - Sud-Ouest) · ArXiv: 0912.1927
2009-12-11
0
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
By Chengqing Li, Kwok-Tung Lo · ArXiv: 0912.1918
2016-09-22
0
Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing
By Rajiv Ranjan, Liang Zhao, Xiaomin Wu · ArXiv: 0912.1905
2016-09-08
0
Verifying Real-Time Systems using Explicit-time Description Methods
By Hao Wang (Centre for Logic, Information, St. Francis Xavier University · ArXiv: 0912.1903
2009-12-11
0
High Availability Cluster System for Local Disaster Recovery with Markov Modeling Approach
By T.T.Lwin, T.Thein · ArXiv: 0912.1835
2009-12-10
0
Lexicographic Multi-objective Geometric Programming Problems
By Dr.A. K. Ojha, K. K. Biswal · ArXiv: 0912.1832
2009-12-10
0
Gesture Recognition with a Focus on Important Actions by Using a Path Searching Method in Weighted Graph
By Kazumoto Tanaka · ArXiv: 0912.1830
2009-12-10
0
«« « 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 » »»