Computer Science

50328 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Correlated Anarchy in Overlapping Wireless Networks
By Panayotis Mertikopoulos, Aris L. Moustakas · ArXiv: 0805.0963
2008-06-09
0
Nonlinear Optimization over a Weighted Independence System
By Jon Lee, Shmuel Onn, Robert Weismantel · ArXiv: 0805.0954
2009-11-21
0
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
By Michael Hilker, Christoph Schommer · ArXiv: 0805.0909
2008-05-08
0
Bounds for self-stabilization in unidirectional networks
By ** Samuel Bernard, Stéphane Devismes, Maria Gradinaru Potop‑Butucaru · ArXiv: 0805.0851
2009-09-29
0
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems
By Michael Hilker, Christoph Schommer · ArXiv: 0805.0850
2008-05-08
0
SANA - Network Protection through artificial Immunity
By Michael Hilker, Christoph Schommer · ArXiv: 0805.0849
2008-05-08
0
Presentation of a Game Semantics for First-Order Propositional Logic
By Samuel Mimram (PPS) · ArXiv: 0805.0845
2008-12-18
0
AGNOSCO - Identification of Infected Nodes with artificial Ant Colonies
By Michael Hilker, Christoph Schommer · ArXiv: 0805.0785
2008-05-07
1
Relational Parametricity and Separation Logic
By Lars Birkedal, Hongseok Yang · ArXiv: 0805.0783
2015-07-01
0
A new queueing strategy for the Adversarial Queueing Theory
By Michael Hilker, Christoph Schommer · ArXiv: 0805.0782
2008-05-07
0
Pruning Attribute Values From Data Cubes with Diamond Dicing
By Hazel Webb, Owen Kaser, Daniel Lemire · ArXiv: 0805.0747
2008-05-07
0
Diversity-Integration Trade-offs in MIMO Detection
By Antonio De Maio, Marco Lops, Luca Venturino · ArXiv: 0805.0740
2022-03-09
0
Quasiperiodic and Lyndon episturmian words
By Amy Glen, Florence Leve, Gwena"el Richomme · ArXiv: 0805.0730
2010-03-16
0
On Expanded Cyclic Codes
By Yingquan Wu · ArXiv: 0805.0615
2008-07-08
0
Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay Networks
By Rahul Vaze, Robert W. Heath Jr · ArXiv: 0805.0589
2008-05-06
0
Discrete Mathematics for Computer Science, Some Notes
By Jean Gallier · ArXiv: 0805.0585
2008-05-06
0
Infinity-Norm Sphere-Decoding
By Dominik Seethaler, Helmut B"olcskei · ArXiv: 0805.0577
2008-11-18
0
An Approach to Learning Research with a Wireless Sensor Network in an Outdoor Setting
By Tom Adam Frederic Anderson, Yean-Fu Wen · ArXiv: 0805.0560
2008-05-06
0
On the Capacity of Free-Space Optical Intensity Channels
By Amos Lapidoth, Stefan M. Moser, Michele A. Wigger · ArXiv: 0805.0521
2008-05-06
0
Analysis of the Deterministic Polynomial Time Solvability of the 0-1-Knapsack Problem
By Jerrald Meek · ArXiv: 0805.0517
2008-09-07
1
The Gaussian MAC with Conferencing Encoders
By Shraga I. Bross, Amos Lapidoth, Michele A. Wigger · ArXiv: 0805.0516
2008-05-06
0
Iterative Hard Thresholding for Compressed Sensing
By ** Thomas Blumensath, Mike E. Davies ** · ArXiv: 0805.0510
2008-05-06
0
Spread Codes and Spread Decoding in Network Coding
By Felice Manganiello, Elisa Gorla, Joachim Rosenthal · ArXiv: 0805.0507
2016-11-17
0
Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon Codes
By Christian Senger, Vladimir Sidorenko, Martin Bossert · ArXiv: 0805.0501
2010-04-29
0
The Tractability of Model-Checking for LTL: The Good, the Bad, and the Ugly Fragments
By Michael Baul, (Knipp GmbH, Germany) · ArXiv: 0805.0498
2016-09-08
0
Phase transition in SONFIS&SORST
By ** Hamed Owladeghaffari (Amirkabir University of Technology, Department of Mining & Metallurgical Engineering, Tehran · ArXiv: 0805.0459
2014-07-29
2
Two-enqueuer queue in Common2
By David Eisenstat · ArXiv: 0805.0444
2009-04-07
0
Network-based consensus averaging with general noisy channels
By Ram Rajagopal, Martin J. Wainwright · ArXiv: 0805.0438
2008-05-06
0
Algorithms for Probabilistically-Constrained Models of Risk-Averse Stochastic Optimization with Black-Box Distributions
By Chaitanya Swamy · ArXiv: 0805.0389
2008-05-06
0
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
By Petar Popovski, Osvaldo Simeone · ArXiv: 0805.0375
2008-05-06
0
«« « 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 » »»