Computer Science

50931 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
Reducing Spreadsheet Risk with FormulaDataSleuth
By ** Bill Bekenn, Ray Hooper (Fairway Associates Ltd., 영국) ** · ArXiv: 0807.2997
2008-07-21
0
The Transport Capacity of a Wireless Network is a Subadditive Euclidean Functional
By Radha Krishna Ganti, Martin Haenggi · ArXiv: 0807.2859
2010-10-11
0
Iterative (Turbo) Multiuser Detectors For Impulse Radio Systems
By E. Fishler, S. Gezici, H. V. Poor · ArXiv: 0807.2728
2016-11-18
0
A Cutting Plane Method based on Redundant Rows for Improving Fractional Distance
By Makoto Miwa, Tadashi Wadayama, Ichi Takumi · ArXiv: 0807.2701
2008-07-18
0
Algorithms for Scheduling Weighted Packets with Deadlines in a Bounded Queue
By ** Fei Li (George Mason University) ** · ArXiv: 0807.2694
2009-02-09
0
Group Divisible Codes and Their Application in the Construction of Optimal Constant-Composition Codes of Weight Three
By ** - **Yeow Meng Chee** (Senior Member, IEEE) – Nanyang Technological University, Singapore - **Gennian Ge** – Zhejiang University · ArXiv: 0807.2680
2008-07-18
0
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
By Jayakrishnan Unnikrishnan, Venugopal Veeravalli · ArXiv: 0807.2677
2010-02-06
0
Source and Channel Coding for Correlated Sources Over Multiuser Channels
By - Deniz Gündüz (Princeton University / Stanford University) - Elza Erkip (Polytechnic Institute of New York University) - Andrea Goldsmith (Stanford University) - H. Vincent Poor (Princeton University) · ArXiv: 0807.2666
2009-07-09
0
The Dark Energy Survey Data Management System
By Joseph J. Mohr (1), Wayne Barkhouse (2), Cristina Beldica (1) · ArXiv: 0807.2515
2009-11-13
0
Hybrid Keyword Search Auctions
By Ashish Goel, Kamesh Munagala · ArXiv: 0807.2496
2009-01-26
0
Opportunistic Collaborative Beamforming with One-Bit Feedback
By Man-On Pun, D. Richard Brown III, H. Vincent Poor · ArXiv: 0807.2475
2016-11-15
0
An ESPRIT-based approach for Initial Ranging in OFDMA systems
By Luca Sanguinetti, Michele Morelli, H. Vincent Poor · ArXiv: 0807.2471
2008-07-17
0
A Grateful Dead Analysis: The Relationship Between Concert and Listening Behavior
By Marko A. Rodriguez, Vadas Gintautas, Alberto Pepe · ArXiv: 0807.2466
2009-01-07
0
On "Bit-Interleaved Coded Multiple Beamforming"
By E. Akay, H. J. Park, E. Ayanoglu · ArXiv: 0807.2464
2008-07-17
0
Construction of Error-Correcting Codes for Random Network Coding
By Tuvi Etzion, Natalia Silberstein · ArXiv: 0807.2440
2008-07-16
0
CPBVP: A Constraint-Programming Framework for Bounded Program Verification
By ** 헬레네 콜라비자 (Hélène Collavizza) – Université de Nice‑Sophia Antipolis, 프랑스 미셸 루에르 (Michel Rueher) – Université de Nice‑Sophia Antipolis, 프랑스 파스칼 반 헨텐리크 (Pascal Van Hentenryck) – Brown University · ArXiv: 0807.2383
2008-07-16
0
Analyse des suites aleatoires engendrees par des automates cellulaires et applications `a la cryptographie
By Bruno Martin (I3S) · ArXiv: 0807.2381
2008-07-16
0
Avatar Mobility in Networked Virtual Environments: Measurements, Analysis, and Implications
By Huiguang Liang, Ian Tay, Ming Feng Neo · ArXiv: 0807.2328
2008-07-16
0
A new characteristic property of rich words
By Michelangelo Bucci, Aless, ro De Luca · ArXiv: 0807.2303
2010-03-16
0
Rate and power allocation under the pairwise distributed source coding constraint
By Shizheng Li, Aditya Ramamoorthy · ArXiv: 0807.2292
2009-06-10
0
Multihop Diversity in Wideband OFDM Systems: The Impact of Spatial Reuse and Frequency Selectivity
By Ozgur Oyman, J. Nicholas Laneman · ArXiv: 0807.2268
2016-11-15
0
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
By Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris · ArXiv: 0807.2053
2008-07-15
0
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
By Aikaterini Mitrokotsa, Manolis Tsagkaris, Christos Douligeris · ArXiv: 0807.2049
2008-07-15
0
Virtual Transmission Method, A New Distributed Algorithm to Solve Sparse Linear System
By ** - Fei Wei - Huazhong Yang ** · ArXiv: 0807.1949
2010-09-09
0
Extension of Inagaki General Weighted Operators and A New Fusion Rule Class of Proportional Redistribution of Intersection Masses
By Florentin Smar, ache · ArXiv: 0807.1906
2009-06-17
0
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
By Beno^it Libert, Damien Vergnaud · ArXiv: 0807.1775
2009-09-08
0
Spatial Interference Cancellation for Multi-Antenna Mobile Ad Hoc Networks
By Kaibin Huang, Jeffrey G. Andrews, Dongning Guo · ArXiv: 0807.1773
2012-08-27
0
Coinductive Formal Reasoning in Exact Real Arithmetic
By Milad Niqui · ArXiv: 0807.1669
2015-07-01
0
A Radar for the Internet
By Matthieu Latapy, Clemence Magnien, Frederic Ouedraogo · ArXiv: 0807.1603
2016-11-15
0
Algorithm Selection as a Bandit Problem with Unbounded Losses
By Matteo Gagliolo, Juergen Schmidhuber · ArXiv: 0807.1494
2013-01-31
0
«« « 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 » »»