Computer Science

53374 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
An Analysis of Key Factors for the Success of the Communal Management of Knowledge
By ** - Isabelle Bourdon – 교수, 정보시스템 전공, 몽펠리에 대학교 (Université Montpellier II) · ArXiv: 0804.2844
2008-04-18
0
Decentralized Knowledge and Learning in Strategic Multi-user Communication
By Yi Su, Mihaela van der Schaar · ArXiv: 0804.2831
2008-04-18
0
Bipolarization of posets and natural interpolation
By Michel Grabisch (CES), Christophe Labreuche (TRT) · ArXiv: 0804.2819
2015-05-13
0
Robust Precoder for Multiuser MISO Downlink with SINR Constraints
By P. Ubaidulla, A. Chockalingam · ArXiv: 0804.2808
2008-04-18
0
Generalized Modal Satisfiability
By Edith Hemaspa, ra, Henning Schnoor · ArXiv: 0804.2729
2008-12-18
0
A Critique of a Polynomial-time SAT Solver Devised by Sergey Gubin
By Ian Christopher, Dennis Huo, Bryan Jacobs · ArXiv: 0804.2699
2008-04-18
0
p-Symmetric fuzzy measures
By Pedro Mir, a, Michel Grabisch (LIP6) · ArXiv: 0804.2642
2008-12-18
0
Augmenting Actual Life Through MUVEs
By Laura Anna Ripamonti, Ines Di Loreto, Dario Maggiorini · ArXiv: 0804.2614
2008-04-17
0
Interlace Polynomials: Enumeration, Unimodality, and Connections to Codes
By Lars Eirik Danielsen, Matthew G. Parker · ArXiv: 0804.2576
2010-02-18
0
The ergodic decomposition of asymptotically mean stationary random sources
By Alex, er Schoenhuth · ArXiv: 0804.2487
2008-04-17
0
On analytic properties of entropy rate
By Alex, er Schönhuth · ArXiv: 0804.2469
2008-04-15
0
On the Expressiveness and Complexity of ATL
By Francois Laroussinie, Nicolas Markey, Ghassan Oreiby · ArXiv: 0804.2435
2015-07-01
0
Universal Quantum Circuits
By Debajyoti Bera, Stephen Fenner, Frederic Green · ArXiv: 0804.2429
2008-04-16
0
Causal models have no complete axiomatic characterization
By Sanjiang Li · ArXiv: 0804.2401
2008-04-16
0
Secure Remote Voting Using Paper Ballots
By Lukasz Nitschke · ArXiv: 0804.2349
2008-04-16
0
Random sampling of colourings of sparse random graphs with a constant number of colours
By Charilaos Efthymiou (1, 2), Paul G. Spirakis (1 · ArXiv: 0804.2343
2008-06-26
0
Parimutuel Betting on Permutations
By Shipra Agrawal, Zizhuo Wang, Yinyu Ye · ArXiv: 0804.2288
2008-12-18
0
Object Re-Use & Exchange: A Resource-Centric Approach
By Carl Lagoze, Herbert Van de Sompel, Michael L. Nelson · ArXiv: 0804.2273
2008-04-16
0
The Secrecy Graph and Some of its Properties
By Martin Haenggi · ArXiv: 0804.2249
2016-11-15
0
Impact of Spatial Correlation on the Finite-SNR Diversity-Multiplexing Tradeoff
By Z. Rezki, David Haccoun, Franc{c}ois Gagnon · ArXiv: 0804.2189
2008-04-15
0
A constructive proof of the existence of Viterbi processes
By J. Lember, A. Koloydenko · ArXiv: 0804.2138
2012-07-24
0
Truthful Unsplittable Flow for Large Capacity Networks
By Yossi Azar, Iftah Gamzu, Shai Gutner · ArXiv: 0804.2112
2008-12-18
0
Optimal Mechansim Design and Money Burning
By Jason D. Hartline, Tim Roughgarden · ArXiv: 0804.2097
2008-04-15
0
A Logic Programming Framework for Combinational Circuit Synthesis
By Paul Tarau, Brenda Luderman · ArXiv: 0804.2095
2008-12-18
0
Physical Layer Network Coding Over Finite And Infinite Fields
By Zhang Shengli, Soung chang Liew, Lu Lu · ArXiv: 0804.2058
2008-04-15
0
Analytical correlation of routing table length index and routing path length index in hierarchical routing model
By Tingrong Lu · ArXiv: 0804.2043
2008-04-15
0
Towards Physarum robots: computing and manipulating on water surface
By Andrew Adamatzky · ArXiv: 0804.2036
2010-11-23
0
Tight Bounds and Faster Algorithms for Directed Max-Leaf Problems
By Paul Bonsma, Frederic Dorn · ArXiv: 0804.2032
2008-12-18
0
Schemes for Deterministic Polynomial Factoring
By Gabor Ivanyos, Marek Karpinski, Nitin Saxena · ArXiv: 0804.1974
2008-04-15
0
A Security Protocol for Multi-User Authentication
By Srikanth Chava · ArXiv: 0804.1970
2008-04-15
0
«« « 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 » »»