首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Architecture and Performance Models for QoS-Driven Effective Peering of Content Delivery Networks
Mukaddim Pathan
,
Rajkumar Buyya
The threshold for random (1,2)-QSAT
Nadia Creignou
,
Herve Daude
,
Uwe Egly
,
Raphael Rossignol
Community Cloud Computing
Alexandros Marinos
,
Gerard Briscoe
Modelling Concurrency with Comtraces and Generalized Comtraces
Ryszard Janicki
,
Dai Tri Man Le
Consideration Points Detecting Cross-Site Scripting
Suman Saha
A Modeling Framework for Generating Security Protocol Specifications
Bela Genge
,
Piroska Haller
Term-based composition of security protocols
Bela Genge
,
Piroska Haller
,
Ovidiu Ratoi
,
Iosif Ignat
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking
Sushma Kejgir
,
Manesh Kokare
SocialFilter: Collaborative Spam Mitigation using Social Networks
Michael Sirivianos
,
Xiaowei Yang
,
Kyungbaek Kim
Pairings on hyperelliptic curves
Jennifer Balakrishnan
,
Juliana Belding
,
Sarah Chisholm
,
Kirsten Eisentraeger
,
Katherine Stange
,
Edlyn Teske
A DHT Based Measure of Randomness
Renuka Kandregula
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining
Dr. Durgesh Kumar Mishra
,
Neha Koria
,
Nikhil Kapoor
,
Ravish Bahety
Hybrid Spam Filtering for Mobile Communication
Ji Won Yoon
,
Hyoungshick Kim
,
Jun Ho Huh
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network
Hanumanthappa J.
,
Manjaiah D. H
Efficient methodology for implementation of Encrypted File System in User Space
Dr. Shishir Kumar
,
U. S. Rawat
,
Sameer Kumar Jasra
,
Akshay Kumar Jain
Clustering for Improved Learning in Maze Traversal Problem
Eddie White
The Medical Algorithms Project
M. Sriram Iyengar
,
John R. Svirbely
An Exploratory Analysis of the Impact of Named Ranges on the Debugging Performance of Novice Users
Ruth McKeever
,
Kevin McDaid
,
Brian Bishop
Documenting Spreadsheets with Pseudo-Code: an Exercise with Cash-Flow and Loans
Jocelyn Paine
Visualization of Mined Pattern and Its Human Aspects
Ratnesh Kumar Jain
,
Dr. Suresh Jain
,
Dr. R. S. Kasana
NLP-SIR: A Natural Language Approach for Spreadsheet Information Retrieval
Derek Flood
,
Kevin Mc Daid
,
Fergal Mc Caffery
Documenting Problem-Solving Knowledge: Proposed Annotation Design Guidelines and their Application to Spreadsheet Tools
Matthew Dinmore
Embedded Spreadsheet Modelling
Angela Collins
Collaborative Search Trails for Video Search
Frank Hopfgartner
,
David Vallet
,
Martin Halvey
,
Joemon Jose
Modeling scientific-citation patterns and other triangle-rich acyclic networks
Zhi-Xi Wu
,
Petter Holme
Transaction-Oriented Simulation In Ad Hoc Grids: Design and Experience
Gerald Krafft
,
Vladimir Getov
Proceedings 7th International Workshop on Security Issues in Concurrency
Michele Boreale
,
Steve Kremer
An Improved Implementation of Grain
Shohreh Sharif Mansouri
,
Elena Dubrova
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol
Dusko Pavlovic
,
Catherine Meadows
Improving Integral Cryptanalysis against Rijndael with Large Blocks
Marine Minier
,
Benjamin Pousse
Simpler Proofs by Symbolic Perturbation
Tobias Jacobs
On the SIG dimension of trees under $L_{\infty}$ metric
L. Sunil Chandran
,
Rajesh Chitnis
,
Ramanjit Kumar
Counting Independent Sets and Kernels of Regular Graphs
Adam B. Yedidia
Testing Distribution Identity Efficiently
Krzysztof Onak
b-Bit Minwise Hashing
Ping Li
,
Arnd Christian Konig
Maximum Matchings in Random Bipartite Graphs and the Space Utilization of Cuckoo Hashtables
Alan Frieze
,
Páll Melsted
Vector Bin Packing with Multiple-Choice
Boaz Patt-Shamir
,
Dror Rawitz
Sorting under Partial Information (without the Ellipsoid Algorithm)
Jean Cardinal
,
Samuel Fiorini
,
Gwena?l Joret
,
Rapha?l Jungers
,
J. Ian Munro
Searching a bitstream in linear time for the longest substring of any given density
Benjamin A. Burton
Exact algorithms for OWA-optimization in multiobjective spanning tree problems
Lucie Galand
,
Olivier Spanjaard
A Note On Higher Order Grammar
Victor Gluzberg
Ludics and its Applications to natural Language Semantics
Alain Lecomte
,
Myriam Quatrini
Evaluation of Hindi to Punjabi Machine Translation System
Vishal Goyal
,
Gurpreet Singh Lehal
An Immune Inspired Approach to Anomaly Detection
Jamie Twycross
,
Uwe Aickelin
Optimal bounds for sign-representing the intersection of two halfspaces by polynomials
Alexander A. Sherstov
Improved Approximation of Linear Threshold Functions
Ilias Diakonikolas
,
Rocco A. Servedio
Stackelberg Pricing is Hard to Approximate within $2-ε$
Parinya Chalermsook
,
Bundit Laekhanukit
,
Danupon Nanongkai
Variance Analysis of Randomized Consensus in Switching Directed Networks
Victor M. Preciado
,
Alireza Tahbaz-Salehi
,
Ali Jadbabaie
High-Performance Cloud Computing: A View of Scientific Applications
Christian Vecchiola
,
Suraj Pandey
,
Rajkumar Buyya
ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era
Sam Skipsey
,
David Ambrose-Griffith
,
Greig Cowan
,
Mike Kenyon
,
Orlando Richards
,
Phil Roffe
,
Graeme Stewart
Go