首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
The Good Old Davis-Putnam Procedure Helps Counting Models
E. Birnbaum
,
E. L. Lozinskii
The FF Planning System: Fast Plan Generation Through Heuristic Search
J. Hoffmann
,
B. Nebel
The GRT Planning System: Backward Heuristic Construction in Forward State-Space Planning
I. Refanidis
,
I. Vlahavas
An Evolutionary Algorithm with Advanced Goal and Priority Specification for Multi-objective Optimization
E. F. Khor
,
T. H. Lee
,
R. Sathikannan
,
K. C. Tan
Nonapproximability Results for Partially Observable Markov Decision Processes
J. Goldsmith
,
C. Lusena
,
M. Mundhenk
Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach
G. A. Kaminka
,
D. V. Pynadath
,
M. Tambe
Random design analysis of ridge regression
Daniel Hsu
,
Sham M. Kakade
,
Tong Zhang
Interdefinability of defeasible logic and logic programming under the well-founded semantics
Frederick Maier
Exploiting Reputation in Distributed Virtual Environments
Walter Quattrociocchi
,
Rosaria Conte
Exploiting Contextual Independence In Probabilistic Inference
D. Poole
,
N. L. Zhang
Symmetry-Based Search Space Reduction For Grid Maps
Daniel Harabor
,
Adi Botea
,
Philip Kilby
Uncertainty in Ontologies: Dempster-Shafer Theory for Data Fusion Applications
Amandine Bellenger
,
Sylvain Gatepaille
ATTac-2000: An Adaptive Autonomous Bidding Agent
M. Kearns
,
M. L. Littman
,
S. Singh
,
P. Stone
Learning Geometrically-Constrained Hidden Markov Models for Robot Navigation: Bridging the Topological-Geometrical Gap
L. P. Kaelbling
,
H. Shatkay
An Analysis of Reduced Error Pruning
T. Elomaa
,
M. Kaariainen
Policy Recognition in the Abstract Hidden Markov Model
H. H. Bui
,
S. Venkatesh
,
G. West
Coherent Integration of Databases by Abductive Logic Programming
O. Arieli
,
M. Bruynooghe
,
M. Denecker
,
B. Van Nuffelen
Barbosa, Uniform Polynomial Time Bounds, and Promises
Lane A. Hemaspaandra
,
Kyle Murray
,
Xiaoqing Tang
A Novel Hybrid Algorithm for Task Graph Scheduling
Vahid Majid Nezhad
,
Habib Motee Gader
,
Evgueni Efimov
Zen Puzzle Garden is NP-complete
Robin Houston
,
Joseph White
,
Martyn Amos
Algorithms for Solving Rubik's Cubes
Erik D. Demaine
,
Martin L. Demaine
,
Sarah Eisenstat
,
Anna Lubiw
,
Andrew Winslow
Extreme-Value Theorems for Optimal Multidimensional Pricing
Yang Cai
,
Constantinos Daskalakis
An Exponential Lower Bound for the Latest Deterministic Strategy Iteration Algorithms
Oliver Friedmann
Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers
Saeed Alaei
False-name-proof Mechanisms for Hiring a Team
Atsushi Iwasaki
,
David Kempe
,
Mahyar Salek
,
Makoto Yokoo
Kernel Bounds for Path and Cycle Problems
Hans L. Bodlaender
,
Bart M. P. Jansen
,
Stefan Kratsch
Complexity Classes and Theories for the Comparator Circuit Value Problem
Stephen A. Cook
,
Dai Tri Man Le
,
Yuli Ye
Some results on equivalence of multi-letter quantum finite automata
Tianrong Lin
Efficient and Distributed SINR-based Joint Resource Allocation and Base Station Assignment in Wireless CDMA Networks
Mohammad R. Javan
,
Ahmad R. Sharafat
Solution of Wald's game using loadings and allowed strategies
Valerio Capraro
No justified complaints: On fair sharing of multiple resources
Danny Dolev
,
Dror G. Feitelson
,
Joseph Y. Halpern
,
Raz Kupferman
,
Nati Linial
Existence of Multiagent Equilibria with Limited Agents
M. Bowling
,
M. Veloso
An adjusted payoff-based procedure for normal form games
Mario Bravo
A law of large numbers for weighted plurality
Joe Neeman
On the Nash Equilibria in Decentralized Parallel Interference Channels
Luca Rose
,
Samir M. Perlaza
,
Mérouane Debbah
An Algorithm for Probabilistic Alternating Simulation
Chenyi Zhang
,
Jun Pang
Instant e-Teaching Framework Model for Live Online Teaching
Suhailan Safei
,
Mat Atar Mat Amin
,
Ahmad Nazari Mohd Rose
,
Mohd Nordin Abdul Rahman
Tales of 34 iPhone Users: How they change and why they are different
Ahmad Rahmati
,
Clayton Shepard
,
Chad Tossell
,
Mian Dong
,
Zhen Wang
,
Lin Zhong
,
Philip Kortum
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
Dusko Pavlovic
,
Catherine Meadows
A Large-Scale Community Structure Analysis In Facebook
Emilio Ferrara
Entropy-based Classification of 'Retweeting' Activity on Twitter
Rumi Ghosh
,
Tawan Surachawala
,
Kristina Lerman
Secure Mining of Association Rules in Horizontally Distributed Databases
Tamir Tassa
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S. A. Arunmozhi
,
Y. Venkataramani
Security Notions for Information Theoretically Secure Encryptions
Mitsugu Iwamoto
,
Kazuo Ohta
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
M. Camilla Fiazza
,
Michele Peroli
,
Luca Viganò
SSA-Caterpillar in Group Anonymity
Dan Tavrov
,
Oleg Chertov
On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes
Anne-Maria Ernvall-Hyt?nen
,
Camilla Hollanti
Byzantine Fault Tolerance of Regenerating Codes
Frédérique Oggier
,
Anwitaman Datta
Secure Deletion on Log-structured File Systems
Joel Reardon
,
Claudio Marforio
,
Srdjan Capkun
,
David Basin
A simple algorithm for the evaluation of the hypergeometric series using quasi-linear time and linear space
Sergey V. Yakhontov
Go