Computer Science

51219 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Anomaly Detection with Score functions based on Nearest Neighbor Graphs
By Manqi Zhao, Venkatesh Saligrama · ArXiv: 0910.5461
2009-10-29
0
Approximation Algorithms for Link Scheduling with Physical Interference Model in Wireless Multi-hop Networks
By Shuai Fan, Lin Zhang, Yong Ren · ArXiv: 0910.5215
2009-10-28
0
Temporal Debugging using URDB
By Ana Maria Visan, Artem Polyakov, Praveen S. Solanki · ArXiv: 0910.5046
2009-10-28
0
A Note on Gradually Varied Functions and Harmonic Functions
By Li Chen, Yong Liu, Feng Luo · ArXiv: 0910.5040
2009-10-28
0
BQP and the Polynomial Hierarchy
By Scott Aaronson · ArXiv: 0910.4698
2009-10-27
0
Self-concordant analysis for logistic regression
By Francis Bach (INRIA Rocquencourt) · ArXiv: 0910.4627
2009-10-27
0
The Geometry of Generalized Binary Search
By Robert D. Nowak · ArXiv: 0910.4397
2013-06-26
0
Pseudorandom Generators for Polynomial Threshold Functions
By Raghu Meka, David Zuckerman · ArXiv: 0910.4122
2015-03-13
0
Heuristic Methods for Security Protocols
By Qurat ul Ain Nizamani (Department of Computer Science, University of Leicester, UK) · ArXiv: 0910.4053
2009-10-22
1
VRAC: Simulation Results #1
By Florian Huc, Aubin Jarry · ArXiv: 0910.4024
2009-10-22
0
Comparison of Algorithms for Checking Emptiness on Buechi Automata
By Andreas Gaiser, Stefan Schwoon · ArXiv: 0910.3766
2009-10-21
0
Improved Approximation of Linear Threshold Functions
By Ilias Diakonikolas, Rocco A. Servedio · ArXiv: 0910.3719
2009-10-21
0
Searching a bitstream in linear time for the longest substring of any given density
By Benjamin A. Burton · ArXiv: 0910.3503
2011-08-22
0
Algorithms for Image Analysis and Combination of Pattern Classifiers with Application to Medical Diagnosis
By Harris Georgiou · ArXiv: 0910.3348
2009-10-20
0
Testing Distribution Identity Efficiently
By ** - **Batu**, **Fortnow**, **Fischer** · ArXiv: 0910.3243
2009-10-20
0
Parameterized Complexity of the k-anonymity Problem
By Stefano Beretta, Paola Bonizzoni, Gianluca Della Vedova · ArXiv: 0910.3148
2013-11-20
0
Abstract Physical Traces
By ** Samson Abramsky, Bob Coecke ** · ArXiv: 0910.3144
2009-10-19
0
On Minimal Unsatisfiability and Time-Space Trade-offs for k-DNF Resolution
By Jakob Nordstr"om, Alex, er Razborov · ArXiv: 0910.3127
2016-09-08
0
An Immune Inspired Network Intrusion Detection System Utilising Correlation Context
By Gianni Tedesco, Uwe Aickelin · ArXiv: 0910.3124
2010-07-05
0
Which Digraphs with Ring Structure are Essentially Cyclic?
By Rafig Agaev, Pavel Chebotarev · ArXiv: 0910.3113
2010-06-04
0
Computing rational points in convex semi-algebraic sets and SOS decompositions
By Mohab Safey El Din (LIP6, INRIA Rocquencourt), Lihong Zhi (KLMM) · ArXiv: 0910.2973
2009-10-16
1
Multiple Cross-Layer Design Based Complete Architecture for Mobile Adhoc Networks
By R. Venkatachalam, A. Krishnan · ArXiv: 0910.2818
2009-10-16
1
Physical layer network coding with multiple antennas
By Shengli Zhang, Soung-Chang Liew · ArXiv: 0910.2603
2010-01-18
0
Big Toy Models: Representing Physical Systems As Chu Spaces
By Samson Abramsky · ArXiv: 0910.2393
2012-07-16
0
State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation
By Evan Hurwitz, Tshilidzi Marwala · ArXiv: 0910.2276
2009-10-14
0
Interference Mitigation Using Uplink Power Control for Two-Tier Femtocell Networks
By Han-Shin Jo, Cheol Mun, June Moon · ArXiv: 0910.2221
2009-10-13
0
The Role of Spreadsheets in the Allied Irish Bank / Allfirst Currency Trading Fraud
By Raymond J. Butler · ArXiv: 0910.2048
2024-12-31
0
A Generalized Recursive Algorithm for Binary Multiplication based on Vedic Mathematics
By Ajinkya Kale, Shaunak Vaidya, Ashish Joglekar · ArXiv: 0910.1969
2009-10-13
0
The intersection of two halfspaces has high threshold degree
By Alex, er A. Sherstov · ArXiv: 0910.1862
2016-09-08
0
DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router
By Mohammad Ali Jabraeil Jamali, Ahmad Khademzadeh · ArXiv: 0910.1852
2009-10-13
0
«« « 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 » »»