Computer Science

50328 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Network Protection Codes Against Link Failures Using Network Coding
By ** Salah A. Aly, Ahmed E. Kamal (Department of Electrical, Computer Engineering · ArXiv: 0809.1258
2016-11-17
1
Applications of Universal Source Coding to Statistical Analysis of Time Series
By Boris Ryabko · ArXiv: 0809.1226
2008-09-09
0
Amdahls and Gustafson-Barsis laws revisited
By Andrzej Karbowski · ArXiv: 0809.1177
2025-12-12
0
A Novel Proportional Fairness Criterion for Throughput Allocation in Multirate IEEE 802.11
By ** - M. Laddomada (Electrical Engineering Dept., Texas A&M University‑Texarkana) - F. Mesiti (DELEN, Politecnico di Torino · ArXiv: 0809.1061
2008-09-08
0
Entropy Concentration and the Empirical Coding Game
By ** - **Peter Grünwald** (Centrum Wiskunde & Informatica, Amsterdam, 네덜란드) ** · ArXiv: 0809.1017
2008-09-17
0
Efficient Implementation of the Generalized Tunstall Code Generation Algorithm
By Michael B. Baer · ArXiv: 0809.0949
2009-05-08
0
Superposition for Fixed Domains
By Matthias Horbach, Christoph Weidenbach · ArXiv: 0809.0922
2009-11-30
0
Irreversible Monte Carlo Algorithms for Efficient Sampling
By ** Konstantin S. Turitsyn, Michael Chertkov, Marija Vucelja ** · ArXiv: 0809.0916
2015-07-15
0
Between the Information Economy and Student Recruitment: Present Conjuncture and Future Prospects
By ** Fionn Murtagh (Science Foundation Irel, Director, Information · ArXiv: 0809.0874
2008-12-21
0
An application of the Threshold Accepting metaheuristic for curriculum based course timetabling
By ** Martin Josef Geiger (University of Hohenheim, Stuttgart, Germany) ** · ArXiv: 0809.0757
2008-10-02
0
Bin Packing Under Multiple Objectives - a Heuristic Approximation Approach
By Martin Josef Geiger · ArXiv: 0809.0755
2008-09-05
3
No-signaling, intractability and entanglement
By ** (논문에 명시된 저자 정보를 그대로 기재) - 이름1, 소속1 - 이름2, 소속2 - … ** · ArXiv: 0809.0600
2009-06-16
0
Interaction Grammars
By ** - **Bruno Guillaume** (LORIA, INRIA Nancy‑Gr, Est) – 이메일: *Bruno.Guillaume@loria.fr* - **Guy Perrier** (LORIA · ArXiv: 0809.0494
2008-09-03
1
Stochastic Combinatorial Optimization under Probabilistic Constraints
By Shipra Agrawal, Amin Saberi, Yinyu Ye · ArXiv: 0809.0460
2008-09-03
0
Genetic Algorithms for multiple objective vehicle routing
By ** M. J. Geiger (University of Hohenheim, Production, Operations Management) ** · ArXiv: 0809.0416
2008-09-03
0
On Duality between Local Maximum Stable Sets of a Graph and its Line-Graph
By Vadim E. Levit, Eugen M, rescu · ArXiv: 0809.0259
2008-09-01
1
Colliding Message Pairs for 23 and 24-step SHA-512
By ** - **Somitra Kumar Sanadhya** (Applied Statistics Unit, Indian Statistical Institute, Kolkata · ArXiv: 0809.0216
2008-09-02
0
A Uniform Approach to Analogies, Synonyms, Antonyms, and Associations
By ** Peter D. Turney (National Research Council of Canada, Institute for Information Technology) ** · ArXiv: 0809.0124
2008-09-02
0
A Variational Inference Framework for Soft-In-Soft-Out Detection in Multiple Access Channels
By D. D. Lin, T. J. Lim · ArXiv: 0809.0032
2009-11-23
0
Using Relative Entropy to Find Optimal Approximations: an Application to Simple Fluids
By ** A. Caticha, R. Preuss (※ 실제 논문 저자는 확인 필요) ** · ArXiv: 0808.4160
2008-10-17
0
From Altruism to Non-Cooperation in Routing Games
By ** - Amar Prakash Azad (INRIA, 프랑스) - Eitan Altman (INRIA, 프랑스) - R. El‑Azouzi (Université d’Avignon · ArXiv: 0808.4079
2008-10-14
0
Essential arity gap of Boolean functions
By ** 논문에 명시된 저자는 **M. Couceiro**, **E. Lehtonen**, **A. Salomaa** · ArXiv: 0808.3892
2008-10-13
0
Approaching Blokh-Zyablov Error Exponent with Linear-Time Encodable/Decodable Codes
By Zheng Wang, Jie Luo · ArXiv: 0808.3756
2016-11-17
0
Scientific Workflow Systems for 21st Century e-Science, New Bottle or New Wine?
By ** 1. Yong Zhao – Microsoft Corporation, Redmond, WA · ArXiv: 0808.3545
2008-08-27
0
Enabling Loosely-Coupled Serial Job Execution on the IBM BlueGene/P Supercomputer and the SiCortex SC5832
By ** Ioan Raicu*, Zhao Zhang+, Mike Wilde#+ · ArXiv: 0808.3536
2008-08-27
0
Efficient algorithms for the basis of finite Abelian groups
By ** Gregory Karagiorgos (Department of Informatics, Telecommunications, University of Athens) Dimitrios Poulakis (Department of Mathematics · ArXiv: 0808.3331
2008-08-26
0
Multi-Instance Multi-Label Learning
By Zhi-Hua Zhou, Min-Ling Zhang, Sheng-Jun Huang · ArXiv: 0808.3231
2011-10-28
0
On the Monotonicity of Work Function in k-Server Conjecture
By Ming-Zhe Chen · ArXiv: 0808.3197
2008-08-26
0
n-ary Fuzzy Logic and Neutrosophic Logic Operators
By Florentin Smar, ache, V. Christianto · ArXiv: 0808.3109
2010-02-16
0
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
By ** Paul Tarau (Department of Computer Science, Engineering, University of North Texas) ** · ArXiv: 0808.2953
2009-01-19
0
«« « 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 » »»