Computer Science

56224 papers in Computer Science

Explore Subcategories

Information Theory
1601 Papers
Artificial Intelligence
1580 Papers
Cryptography and Security
1290 Papers
Data Structures and Algorithms
1258 Papers
Networking
1126 Papers
Discrete Mathematics
1039 Papers
Distributed Computing
981 Papers
Logic in Computer Science
972 Papers
Software Engineering
935 Papers
Machine Learning
932 Papers
Computers and Society
915 Papers
Computational Complexity
861 Papers
TITLE
DATE
VIEWS
On the Superdistribution of Digital Goods
By Andreas U. Schmidt · ArXiv: 0806.1543
2008-06-11
2
Posets and Permutations in the Duplication-Loss Model: Minimal Permutations with d Descents
By Mathilde Bouvel (LIAFA), Elisa Pergola (DSI) · ArXiv: 0806.1494
2008-12-18
4
Dynamic Network of Concepts from Web-Publications
By D. V. L, e, A. A. Snarskii · ArXiv: 0806.1439
2008-12-18
2
Topological Complexity of Context-Free omega-Languages: A Survey
By Olivier Finkel (ELM, IMJ, LIP) · ArXiv: 0806.1413
2013-03-14
2
The Improvement of the Bound on Hash Family
By Xianmin Ming, Jiansheng Yang · ArXiv: 0806.1397
2008-12-18
4
An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
By Sunder Lal, V, ani Verma · ArXiv: 0806.1377
2008-06-10
4
Robust Cognitive Beamforming With Partial Channel State Information
By Lan Zhang, Ying-Chang Liang, Yan Xin · ArXiv: 0806.1372
2009-01-04
3
VPOET: Using a Distributed Collaborative Platform for Semantic Web Applications
By Mariano Rico, David Camacho, Oscar Corcho · ArXiv: 0806.1361
2008-06-10
4
The end of Sleeping Beautys nightmare
By Berry Groisman · ArXiv: 0806.1316
2008-06-10
2
The Separation of Duty with Privilege Calculus
By Chenggong Lv, Jun Wang, Lu Liu · ArXiv: 0806.1284
2008-06-10
0
Extracting Programs from Constructive HOL Proofs via IZF Set-Theoretic<br> Semantics
By Robert Constable, Wojciech Moczydlowski · ArXiv: 0806.1281
2015-07-01
1
The Role of Artificial Intelligence Technologies in Crisis Response
By Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy · ArXiv: 0806.1280
2008-06-10
3
Scheduling Sensors by Tiling Lattices
By Andreas Klappenecker, Hyunyoung Lee, Jennifer L. Welch (Texas A&M University) · ArXiv: 0806.1271
2008-06-10
1
Understanding individual human mobility patterns
By M.C. Gonzalez, C.A. Hidalgo, A.-L. Barabasi · ArXiv: 0806.1256
2009-11-13
2
ICT, Community Memory and Technological Appropriation
By Rodrigo Torrens, Luis A. Nunez, Raisa Urribarri · ArXiv: 0806.1246
2008-06-10
3
Improving Classical Authentication with Quantum Communication
By F. M. Assis, P. Mateus, Y. Omar · ArXiv: 0806.1231
2010-02-12
4
Performance of LDPC Codes Under Faulty Iterative Decoding
By Lav R. Varshney · ArXiv: 0806.1215
2010-05-31
0
Belief Propagation and Beyond for Particle Tracking
By Michael Chertkov, Lukas Kroc, Massimo Vergassola · ArXiv: 0806.1199
2008-06-09
2
Utilisation des grammaires probabilistes dans les t^aches de segmentation et dannotation prosodique
By Irina Nesterenko (LPL), Stephane Rauzy (LPL) · ArXiv: 0806.1156
2008-12-18
1
Unsatisfiable CNF Formulas need many Conflicts
By Dominik Scheder, Philipp Zumstein · ArXiv: 0806.1148
2010-09-07
3
Significant Diagnostic Counterexamples in Probabilistic Model Checking
By Miguel E. Andres, Pedro DArgenio, Peter van Rossum · ArXiv: 0806.1139
2008-06-09
2
On the Approximability of Comparing Genomes with Duplicates
By Sebastien Angibaud (LINA), Guillaume Fertin (LINA), Irena Rusu (LINA) · ArXiv: 0806.1103
2008-12-18
1
Fair Access Provisioning through Contention Parameter Adaptation in the IEEE 802.11e Infrastructure Basic Service Set
By Feyza Keceli, Inanc Inan, Ender Ayanoglu · ArXiv: 0806.1093
2008-06-09
2
Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set
By Feyza Keceli, Inanc Inan, Ender Ayanoglu · ArXiv: 0806.1089
2008-06-09
1
Capacity of Block-Memoryless Channels with Causal Channel Side Information
By Hamid Farmanbar, Amir K. Kh, ani · ArXiv: 0806.1062
2008-06-09
3
3-connected Planar Graph Isomorphism is in Log-space
By Samir Datta, Nutan Limaye, Prajakta Nimbhorkar · ArXiv: 0806.1041
2008-09-16
3
Analysis of a procedure for inserting steganographic data into VoIP calls
By Wojciech Mazurczyk, Jozef Lubacz · ArXiv: 0806.1034
2008-08-25
3
A Comparison of Performance Measures for Online Algorithms
By Joan Boyar, S, y Irani · ArXiv: 0806.0983
2012-10-15
1
On convergence-sensitive bisimulation and the embedding of CCS in timed CCS
By Roberto Amadio (PPS) · ArXiv: 0806.0936
2010-07-01
2
Drawing Binary Tanglegrams: An Experimental Evaluation
By Martin N"ollenburg, Danny Holten, Markus V"olker · ArXiv: 0806.0928
2009-05-15
1
«« « 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 » »»