首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Distributed Inference and Query Processing for RFID Tracking and Monitoring
Zhao Cao
,
Charles Sutton
,
Yanlei Diao
,
Prashant Shenoy
Lower bounds on the obstacle number of graphs
Padmini Mukkamala
,
János Pach
,
D?m?t?r Pálv?lgyi
Epidemic centrality - is there an underestimated epidemic impact of network peripheral nodes?
Mile Sikic
,
Alen Lancic
,
Nino Antulov-Fantulin
,
Hrvoje Stefancic
A new approach to nonrepetitive sequences
Jaros?aw Grytczuk
,
Jakub Kozik
,
Piotr Micek
On Joint Diagonalisation for Dynamic Network Analysis
Damien Fay
,
Jér?me Kunegis
,
Eiko Yoneki
On dynamic monopolies of graphs with general thresholds
Manouchehr Zaker
A variant of Hofstadter's sequence and finite automata
J. -P. Allouche
,
J. Shallit
Cut locus structures on graphs
Jin-ichi Itoh
,
Costin V\
,
\ilcu
Pegging Numbers For Various Tree Graphs
Ariel Levavi
Stability of a Peer-to-Peer Communication System
Ji Zhu
,
Bruce Hajek
Towards a native toplevel for the OCaml language
Marcell Fischbach
,
Benedikt Meurer
Cost Analysis of Redundancy Schemes for Distributed Storage Systems
Lluis Pamies-Juarez
,
Ernst Biersack
On the Cost of Concurrency in Transactional Memory
Petr Kuznetsov
,
Srivatsan Ravi
LIFO-search on digraphs: A searching game for cycle-rank
Paul Hunter
Efficient Hierarchical Markov Random Fields for Object Detection on a Mobile Robot
Colin S. Lea
,
Jason J. Corso
A Reference Based, Tree Structured Time Synchronization Approach and its Analysis in WSN
Surendra Rahamatkar
,
Dr. Ajay Agarwal
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navigation System
Wan Mohd. Yaakob Wan Bejuri
,
Mohd. Murtadha Mohamad
,
Maimunah Sapri
Probability Bracket Notation, Term Vector Space, Concept Fock Space and Induced Probabilistic IR Models
Xing M. Wang
Decidability and Shortest Strings in Formal Languages
Levent Alpoge
,
Thomas Ang
,
Luke Schaeffer
,
Jeffrey Shallit
A note on active learning for smooth problems
Satyaki Mahalanabis
Augmented reality usage for prototyping speed up
Jiri Stastny
,
David Prochazka
,
Tomas Koubek
,
Jaromir Landa
Parallel Online Learning
Daniel Hsu
,
Nikos Karampatziakis
,
John Langford
,
Alex Smola
Pattern-recalling processes in quantum Hopfield networks far from saturation
Jun-ichi Inoue
Sources of Inter-package Conflicts in Debian
Cyrille Artho
,
Roberto Di Cosmo
,
Kuniyasu Suzaki
,
Stefano Zacchiroli
Ward's Hierarchical Clustering Method: Clustering Criterion and Agglomerative Algorithm
Fionn Murtagh
,
Pierre Legendre
Invariant texture analysis through Local Binary Patterns
Rodrigo Nava
,
Gabriel Cristóbal
,
Boris Escalante-Ramírez
An image processing of a Raphael's portrait of Leonardo
Amelia Carolina Sparavigna
Minutiae Extraction from Fingerprint Images - a Review
Roli Bansal
,
Priti Sehgal
,
Punam Bedi
Kernel diff-hash
Michael M Bronstein
Representations and Ensemble Methods for Dynamic Relational Classification
Ryan A. Rossi
,
Jennifer Neville
Abstract Processes of Place/Transition Systems
Rob van Glabbeek
,
Ursula Goltz
,
Jens-Wolfhard Schicke
Cost effective approach on feature selection using genetic algorithms and fuzzy logic for diabetes diagnosis
E. P. Ephzibah
The Object Projection Feature Estimation Problem in Unsupervised Markerless 3D Motion Tracking
Luis Quesada
,
Alejandro J. León
Large Overlaid Cognitive Radio Networks: From Throughput Scaling to Asymptotic Multiplexing Gain
Armin Banaei
,
Costas N. Georghiades
,
Shuguang Cui
Performance Comparisons of Routing Protocols in Mobile Ad Hoc Networks
P. Manickam
,
T. Guru Baskar
,
M. Girija
,
Dr. D. Manimegalai
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Dushyant Arora
,
Marcin Bienkowski
,
Anja Feldmann
,
Gregor Schaffrath
,
Stefan Schmid
Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS
Michael F. Nowlan
,
Nabin Tiwari
,
Janardhan Iyengar
,
Syed Obaid Amin
,
Bryan Ford
High-Precision Tuning of State for Memristive Devices by Adaptable Variation-Tolerant Algorithm
Fabien Alibart
,
Ligang Gao
,
Brian Hoskins
,
Dmitri Strukov
Patterns of Emotional Blogging and Emergence of Communities: Agent-Based Model on Bipartite Networks
Marija Mitrovi?
,
Bosiljka Tadi?
Delay Constrained Throughput Analysis of a Correlated MIMO Wireless Channel
Kashif Mahmood
,
Mikko Vehkaper?
,
Yuming Jiang
Mixing Board Versus Mouse Interaction In Value Adjustment Tasks
Steven Bergner
,
Matthew Crider
,
Arthur E. Kirkpatrick
,
Torsten M?ller
Multi-path Routing Metrics for Reliable Wireless Mesh Routing Topologies
Phoebus Chen
,
Karl H. Johansson
,
Paul Balister
,
Béla Bollobás
,
Shankar Sastry
Web-Based Multi-View Visualizations for Aggregated Statistics
Daniel Hienert
,
Benjamin Zapilko
,
Philipp Schaer
,
Brigitte Mathiak
Optimal channel allocation with dynamic power control in cellular networks
Xin Wu
,
Arunita Jaekel
,
Ataul Bari
SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution
Jie Li
,
Jian-ping Wu
,
Ke Xu
FavourQueue: a Parameterless Active Queue Management to Speed Up Short TCP Flows (and others too!)
Pascal Anelli
,
Remi Diana
,
Emmanuel Lochin
A New Localized Network Based Routing Model in Computer and Communication networks
Abdulbaset H. Mohammad
A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash
Mohammed Erritali
,
Oussama Mohamed Reda
,
Bouabid El Ouahidi
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Stevens Le Blond
,
Pere Manils
,
Chaabane Abdelberi
,
Mohamed Ali Dali Kaafar
,
Claude Castelluccia
,
Arnaud Legout
,
Walid Dabbous
Stability and Queueing Analysis of IEEE 802.11 Distributed Coordination Function
Dongjie Yin
,
Pui King Wong
,
Tony T. Lee
Go