Computer Science

50931 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Fault Identification via Non-parametric Belief Propagation
By Danny Bickson, Dror Baron, Alex T. Ihler · ArXiv: 0908.2005
2015-03-13
2
Spectral Graph Analysis of Quasi-Cyclic Codes
By ** - **Roxana Smar, ache** – Department of Mathematics, Statistics · ArXiv: 0908.1966
2009-08-17
0
Improved Sparsity Thresholds Through Dictionary Splitting
By Patrick Kuppinger, Giuseppe Durisi, Helmut B"olcskei · ArXiv: 0908.1676
2016-11-18
0
Decimation flows in constraint satisfaction problems
By Saburo Higuchi, Marc Mezard · ArXiv: 0908.1599
2010-05-11
1
From error detection to behaviour observation: first results from screen capture analysis
By Francoise Tort, Francois-Marie Blondel, Eric Bruillard · ArXiv: 0908.1580
2011-02-19
2
Interfacing network coding with TCP: an implementation
By ** Jay Kumar Sundararajan, Szymon Jakubczak, Muriel Médard · ArXiv: 0908.1564
2009-08-12
0
Vulnerability analysis of three remote voting methods
By ** - **Chantal Enguehard** (Université de Nantes, Laboratoire d'Informatique Nantes Atlantique) - **Rémi Lehn** (Université de Nantes, Laboratoire d'Informatique Nantes Atlantique) ** · ArXiv: 0908.1059
2009-08-10
0
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining
By Dr. Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor · ArXiv: 0908.0994
2009-08-10
0
A multidimensional approach for context-aware recommendation in mobile commerce
By Maryam Hosseini-Pozveh, Mohamadali Nematbakhsh, Naser Movahhedinia · ArXiv: 0908.0982
2009-08-10
0
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks
By ** - **Syed S. Rizvi** – Computer Science, Engineering Department, University of Bridgeport · ArXiv: 0908.0980
2009-08-10
0
Authentication Without Identification using Anonymous Credential System
By A. Damodaram, H. Jayasri · ArXiv: 0908.0979
2009-08-10
0
Efficient methodology for implementation of Encrypted File System in User Space
By Dr. Shishir Kumar, U.S. Rawat, Sameer Kumar Jasra · ArXiv: 0908.0551
2009-08-06
0
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network
By ** - **Hanumanthappa J.** – Department of Computer Science, University of Mysore, India (hanums_j@yahoo.com) - **Dr. Manjaiah D.H.** – Department of Computer Science · ArXiv: 0908.0548
2009-08-06
0
REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P != NP
By Shenghui Su, Shuwang Lu · ArXiv: 0908.0482
2014-08-27
1
Data management in systems biology I - Overview and bibliography
By Gerhard Mayer · ArXiv: 0908.0411
2009-12-15
0
On Bijective Variants of the Burrows-Wheeler Transform
By Manfred Kufleitner · ArXiv: 0908.0239
2009-08-04
0
An Improvement of Cover/El Gamals Compress-and-Forward Relay Scheme
By Liang-Liang Xie · ArXiv: 0908.0163
2009-08-15
0
Intelligent Advisory System for Supporting University Managers in Law
By ** - **A. E. E. ElAlfi** – 컴퓨터과학부, Mansoura University, Egypt (이메일: Ael_Alfi@yahoo.com) - **M. E. ElAlami** – 컴퓨터과학부 · ArXiv: 0908.0124
2009-08-04
0
Knowledge Discovery of Hydrocyclone s Circuit Based on SONFIS and SORST
By H. O. Ghaffari, M. Ejtemaei, M. Irannajad · ArXiv: 0908.0089
2009-08-04
0
A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security
By ** - Manas Paul (Sr. Lecturer, Dept. of Computer Application, JIS College of Engineering · ArXiv: 0908.0080
2009-08-04
1
On Random Construction of a Bipolar Sensing Matrix with Compact Representation
By Tadashi Wadayama · ArXiv: 0908.0045
2009-08-01
0
Convergence of Expected Utility for Universal AI
By Peter de Blanc · ArXiv: 0907.5598
2009-07-31
0
A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks
By B.Narasimhan, S.Santhosh baboo · ArXiv: 0907.5441
2009-08-03
0
Efficient Web Log Mining using Doubly Linked Tree
By Ratnesh Kumar Jain, Dr. R. S. Kasana, Dr. Suresh Jain · ArXiv: 0907.5433
2009-08-03
0
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic
By Juan Jose Jaramillo, R. Srikant · ArXiv: 0907.5402
2009-12-13
0
Speedup in the Traveling Repairman Problem with Unit Time Windows
By ** Greg N. Frederickson, Barry Wittman ** · ArXiv: 0907.5372
2009-07-31
0
Recursive Random Number Generator Using Prime Reciprocals
By Subhash Kak · ArXiv: 0907.5226
2009-07-31
0
Interference alignment-based sum capacity bounds for random dense Gaussian interference networks
By Oliver Johnson, Matthew Aldridge, Robert Piechocki · ArXiv: 0907.5165
2011-09-12
0
On Classification from Outlier View
By Refer to original PDF · ArXiv: 0907.5155
2012-01-04
0
Cutwidth and degeneracy of graphs
By Benoit Kloeckner (IF) · ArXiv: 0907.5138
2010-11-01
0
«« « 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 » »»