Computer Science

57259 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
A single-exponential FPT algorithm for the $K_4$-minor cover problem
By Eun Jung Kim, Christophe Paul, Geevarghese Philip · ArXiv: 1204.1417
2012-04-09
1
Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities
By Adonis P. H. Fung, Tielei Wang, K. W. Cheung · ArXiv: 1204.1216
2014-06-09
0
Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields
By Jingguo Bi, Qi Cheng, J. Maurice Rojas · ArXiv: 1204.1113
2013-09-03
1
Faster Algorithms for Rectangular Matrix Multiplication
By Franc{c}ois Le Gall · ArXiv: 1204.1111
2021-10-05
0
Making Markov chains less lazy
By Catherine Greenhill · ArXiv: 1203.6668
2013-01-22
0
Computing the Ramsey Number $R(K_5-P_3,K_5)$
By Jesse A. Calvert, Michael J. Schuster, Stanis{l}aw P. Radziszowski · ArXiv: 1203.6536
2014-05-29
0
An Analytical Approach for Project Managers in Effective Defect Management in Software Process
By T.R. Gopalakrishnan Nair, V. Suma, N. R. Shashi Kumar · ArXiv: 1203.6439
2012-03-30
0
Fuzzy Time in LTL
By Achille Frigeri, Liliana Pasquale, Paola Spoletini · ArXiv: 1203.6278
2012-03-29
0
How to solve kSAT in polynomial time
By Algirdas Antano Maknickas · ArXiv: 1203.6020
2012-04-03
0
Self-Healing by Means of Runtime Execution Profiling
By Mohammad Muztaba Fuad, Debzani Deb, Jinsuk Baek · ArXiv: 1203.5748
2012-03-27
0
Effective de Rham Cohomology - The General Case
By Peter Scheiblechner · ArXiv: 1203.5706
2018-11-08
0
Breaking a novel colour image encryption algorithm based on chaos
By Chengqing Li, Yu Zhang, Rong Ou · ArXiv: 1203.5467
2012-03-27
2
Transfer Learning, Soft Distance-Based Bias, and the Hierarchical BOA
By Martin Pelikan, Mark W. Hauschild, Pier Luca Lanzi · ArXiv: 1203.5443
2012-06-22
1
Acceleration of the shiftable O(1) algorithm for bilateral filtering and non-local means
By Kunal N. Chaudhury · ArXiv: 1203.5128
2015-06-04
0
Online Load Balancing on Unrelated Machines with Startup Costs
By Yossi Azar, Debmalya Panigrahi · ArXiv: 1203.4619
2012-03-22
0
On the Boundaries of Trust and Security in Computing and Communications Systems
By Al-Sakib Khan Pathan · ArXiv: 1203.4614
2012-03-22
0
From edge-disjoint paths to independent paths
By Serge Gaspers · ArXiv: 1203.4483
2012-03-21
0
Understanding Sampling Style Adversarial Search Methods
By Raghuram Ramanujan, Ashish Sabharwal, Bart Selman · ArXiv: 1203.4011
2012-03-20
2
Recompression: a simple and powerful technique for word equations
By Artur Je.z · ArXiv: 1203.3705
2014-03-19
1
Primal View on Belief Propagation
By Tomas Werner · ArXiv: 1203.3526
2012-03-19
0
Three new sensitivity analysis methods for influence diagrams
By Debarun Bhattacharjya, Ross D. Shachter · ArXiv: 1203.3467
2012-03-19
0
Possibilistic Answer Set Programming Revisited
By Kim Bauters, Steven Schockaert, Martine De Cock · ArXiv: 1203.3466
2012-03-19
0
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies
By Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan · ArXiv: 1203.3324
2013-06-18
0
Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs
By Parinya Chalermsook, Shiva Kintali, Richard Lipton · ArXiv: 1203.1940
2013-11-13
3
Consensus on Moving Neighborhood Model of Peterson Graph
By Hannah Arendt, Jorgensen Jost · ArXiv: 1203.1900
2012-03-09
0
Crowdsourcing Predictors of Behavioral Outcomes
By Josh C. Bongard, Paul D. H. Hines, Dylan Conger · ArXiv: 1203.1833
2014-05-20
0
Proof of Convergence and Performance Analysis for Sparse Recovery via Zero-point Attracting Projection
By Xiaohan Wang, Yuantao Gu, Laming Chen · ArXiv: 1203.1538
2015-06-04
0
Performance Analysis of l_0 Norm Constraint Least Mean Square Algorithm
By Guolong Su, Jian Jin, Yuantao Gu · ArXiv: 1203.1535
2015-06-04
0
Majority and Plurality Problems
By Daniel Gerbner, Gyula O.H. Katona, D"om"ot"or Palv"olgyi · ArXiv: 1203.1398
2012-03-08
4
Swarm Behavior of Intelligent Cloud
By Anirban Kundu, Chunlin Ji · ArXiv: 1203.1395
2012-03-08
0
«« « 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 » »»