Computer Science

50624 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Finite Lattice-Size Effects in MIMO Detection
By Christoph Studer, Dominik Seethaler, Helmut B"olcskei · ArXiv: 0811.4339
2008-11-27
0
Ensuring Query Compatibility with Evolving XML Schemas
By Pierre Genev`es, Nabil Laya"ida, Vincent Quint · ArXiv: 0811.4324
2008-11-27
0
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
By Julio C. Hern, ez-Castro, Juan M. E. Tapiador · ArXiv: 0811.4257
2008-11-27
0
Entanglement-assisted communication of classical and quantum information
By Min-Hsiu Hsieh, Mark M. Wilde · ArXiv: 0811.4227
2010-08-23
0
Two Models for Noisy Feedback in MIMO Channels
By ** Vaneet Aggarwal (Princeton University) Gajanana Krishna (Stanford University) Srikrishna Bhashyam (Indian Institute of Technology Madras) Ashutosh Sabharwal (Rice University) ** · ArXiv: 0811.4200
2008-11-27
0
Performance of Hybrid-ARQ in Block-Fading Channels: A Fixed Outage Probability Analysis
By Peng Wu, Nihar Jindal · ArXiv: 0811.4191
2009-09-17
0
High resolution dynamical mapping of social interactions with active RFID
By Alain Barrat, Ciro Cattuto, Vittoria Colizza · ArXiv: 0811.4170
2010-08-18
0
Packing and Covering Properties of Subspace Codes for Error Control in Random Linear Network Coding
By Maximilien Gadouleau, Zhiyuan Yan · ArXiv: 0811.4163
2010-03-31
0
Artin automorphisms, Cyclotomic function fields, and Folded list-decodable codes
By Venkatesan Guruswami · ArXiv: 0811.4139
2008-11-26
0
LACK - a VoIP Steganographic Method
By Wojciech Mazurczyk, Jozef Lubacz · ArXiv: 0811.4138
2008-11-26
0
Interval greedoids and families of local maximum stable sets of graphs
By Vadim E. Levit, Eugen M, rescu · ArXiv: 0811.4089
2011-01-25
3
Benchmarking the solar dynamo with Maxima
By ** - **Pipin, V. V.** (주 저자) – 연구 아이디어와 Maxima 구현 전반 담당. - **Seehafer, N.** – 코드 검증 및 물리적 해석 지원. ** · ArXiv: 0811.4061
2008-11-26
0
ELASTICITY: Topological Characterization of Robustness in Complex Networks
By Ali Sydney, Caterina Scoglio, Phillip Schumm · ArXiv: 0811.4040
2008-11-27
0
Computation of Grobner basis for systematic encoding of generalized quasi-cyclic codes
By Vo Tam Van, Hajime Matsui, Seiichi Mita · ArXiv: 0811.4033
2008-11-26
0
Analytical Framework for Optimizing Weighted Average Download Time in Peer-to-Peer Networks
By Bike Xie, Mihaela van der Schaar, Richard D. Wesel · ArXiv: 0811.4030
2008-11-26
0
The Simultaneous Membership Problem for Chordal, Comparability and Permutation graphs
By Krishnam Raju Jampani, Anna Lubiw · ArXiv: 0811.4007
2008-11-26
0
A polytime proof of correctness of the Rabin-Miller algorithm from Fermats little theorem
By Grzegorz Herman, Michael Soltys · ArXiv: 0811.3959
2008-11-25
0
Extractors and an efficient variant of Muchniks theorem
By Daniil Musatov · ArXiv: 0811.3958
2008-11-25
0
Optimal Filtering of Malicious IP Sources
By Fabio Soldo, Athina Markopoulou, Katerina Argyraki · ArXiv: 0811.3828
2008-11-25
0
Real Computation with Least Discrete Advice: A Complexity Theory of Nonuniform Computability
By Martin Ziegler · ArXiv: 0811.3782
2009-09-02
0
The Relationship between Tsallis Statistics, the Fourier Transform, and Nonlinear Coupling
By Kenric P. Nelson, Sabir Umarov · ArXiv: 0811.3777
2008-11-25
0
Communication Efficiency in Self-stabilizing Silent Protocols
By Stephane Devismes, Toshimitsu Masuzawa, Sebastien Tixeuil (LIP6) · ArXiv: 0811.3760
2008-11-25
0
Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-Way Cut Problem
By Mingyu Xiao, Leizhen Cai, Andrew C. Yao · ArXiv: 0811.3723
2008-11-25
0
Performance Modeling and Evaluation for Information-Driven Networks
By Kui Wu, Yuming Jiang, Guoqiang Hu · ArXiv: 0811.3712
2008-11-25
0
Revisiting Norm Estimation in Data Streams
By : Indyk, Piotr; Woodruff, David P.; Yi · ArXiv: 0811.3648
2023-06-15
0
Solving package dependencies: from EDOS to Mancoosi
By Ralf Treinen (PPS), Stefano Zacchiroli (PPS) · ArXiv: 0811.3620
2008-11-24
0
Low-Memory Adaptive Prefix Coding
By Travis Gagie, Marek Karpinski, Yakov Nekrich · ArXiv: 0811.3602
2008-11-24
0
The Capacity of Ad hoc Networks under Random Packet Losses
By Vivek P. Mhatre, Catherine P. Rosenberg, Ravi R. Mazumdar · ArXiv: 0811.3585
2008-11-24
0
Craig Interpolation for Quantifier-Free Presburger Arithmetic
By Angelo Brillout, Daniel Kroening, Thomas Wahl · ArXiv: 0811.3521
2008-11-24
0
Dynamic System Adaptation by Constraint Orchestration
By L.P.J. Groenewegen, E.P. de Vink · ArXiv: 0811.3492
2008-11-24
0
«« « 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 » »»