Computer Science

50931 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
On the Boundedness of the Support of Optimal Input Measures for Rayleigh Fading Channels
By Jochen Sommerfeld, Igor Bjelakovic, Holger Boche · ArXiv: 0801.2034
2008-01-15
0
Online variants of the cross-entropy method
By Istvan Szita, Andras Lorincz · ArXiv: 0801.1988
2008-01-15
1
A Nearly Linear-Time PTAS for Explicit Fractional Packing and Covering Linear Programs
By Christos Koufogiannakis, Neal E. Young · ArXiv: 0801.1987
2015-06-02
0
Minimum Leaf Out-branching and Related Problems
By G. Gutin, I. Razgon, E.J. Kim · ArXiv: 0801.1979
2008-10-14
1
D-optimal Bayesian Interrogation for Parameter and Noise Identification of Recurrent Neural Networks
By Barnabas Poczos, Andras Lorincz · ArXiv: 0801.1883
2008-01-15
0
Interpretation as a factor in understanding flawed spreadsheets
By David A. Banks, Ann Monday · ArXiv: 0801.1856
2024-12-31
0
Ideal synchronizer for marked pairs in fork-join network
By S. V. Vyshenski, P. V. Grigoriev, Yu. Yu. Dubenskaya · ArXiv: 0801.1784
2009-09-29
0
An omega-power of a context-free language which is Borel above Delta^0_omega
By Jacques Duparc (UNIL), Olivier Finkel (LIP) · ArXiv: 0801.1783
2008-09-10
0
Bi-criteria Pipeline Mappings for Parallel Image Processing
By Anne Benoit (INRIA Rh^one-Alpes, LIP), Harald Kosch · ArXiv: 0801.1772
2008-01-14
0
A Family of Counter Examples to an Approach to Graph Isomorphism
By Jin-Yi Cai, Pinyan Lu, Mingji Xia · ArXiv: 0801.1766
2008-01-14
0
Extensions to Network Flow Interdiction on Planar Graphs
By Rico Zenklusen · ArXiv: 0801.1737
2008-01-14
0
A Central Limit Theorem for the SNR at the Wiener Filter Output for Large Dimensional Signals
By Abla Kammoun, Malika Kharouf, Walid Hachem · ArXiv: 0801.1736
2008-01-14
0
Achieving the Quadratic Gaussian Rate-Distortion Function for Source Uncorrelated Distortions
By Milan S. Derpich, Jan Ostergaard, Daniel E. Quevedo · ArXiv: 0801.1718
2008-07-24
0
On Breaching Enterprise Data Privacy Through Adversarial Information Fusion
By Srivatsava Ranjit Ganta, Raj Acharya · ArXiv: 0801.1715
2008-02-08
0
The Quadratic Gaussian Rate-Distortion Function for Source Uncorrelated Distortions
By Milan S. Derpich, Jan Ostergaard, Graham C. Goodwin · ArXiv: 0801.1703
2008-01-14
0
Synthesis of Large Dynamic Concurrent Programs from Dynamic Specifications
By Paul C. Attie · ArXiv: 0801.1687
2008-01-14
0
Episturmian words: a survey
By Amy Glen, Jacques Justin · ArXiv: 0801.1655
2010-03-16
0
A Most General Edge Elimination Polynomial - Thickening of Edges
By Christian Hoffmann · ArXiv: 0801.1600
2008-01-11
0
An Evaluation of a Structured Spreadsheet Development Methodology
By Kamalasen Rajalingham, David Chadwick, Brian Knight · ArXiv: 0801.1516
2024-12-31
0
Teaching spreadsheet development using peer audit and self-audit methods for reducing error
By David Chadwick, Rodney E. Sue · ArXiv: 0801.1514
2024-12-31
0
Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime
By Vincent Gramoli (IRISA), Anne-Marie Kermarrec (IRISA), Achour Mostefaoui (IRISA) · ArXiv: 0801.1419
2008-01-10
1
Fast Integer Multiplication using Modular Arithmetic
By Anindya De, Piyush P Kurur, Ch · ArXiv: 0801.1416
2008-09-19
0
Two graph isomorphism polytopes
By Shmuel Onn · ArXiv: 0801.1410
2009-08-22
0
An Algorithm to Compute the Nearest Point in the Lattice $A_{n}^*$
By Robby G. McKilliam, I. Vaughan L. Clarkson, Barry G. Quinn · ArXiv: 0801.1364
2008-09-30
0
A new key exchange cryptosystem
By An-Ping Li · ArXiv: 0801.1362
2008-01-20
0
Stream Computing
By Subhash Kak · ArXiv: 0801.1336
2008-01-10
1
Alternating Hierarchies for Time-Space Tradeoffs
By Chris Pollett, Eric Miles · ArXiv: 0801.1307
2008-01-09
0
Capacity Bounds for the Gaussian Interference Channel
By Abolfazl S. Motahari, Amir K. Kh, ani · ArXiv: 0801.1306
2008-01-09
1
LDPC Codes Which Can Correct Three Errors Under Iterative Decoding
By Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic · ArXiv: 0801.1282
2016-11-17
0
On the guaranteed error correction capability of LDPC codes
By Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane Vasic · ArXiv: 0801.1276
2016-11-17
1
«« « 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 » »»