首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Growing Scale-free Networks by a Mediation-Driven Attachment Rule
Kamrul Hassan
,
Liana Islam
A Logic for Reasoning about Evidence
Joseph Y. Halpern
,
Riccardo Pucella
When Ignorance is Bliss
Peter D. Grunwald
,
Joseph Y. Halpern
Threshold-based monitoring of cascading outages with PMU measurements of area angle
Atena Darvishi
,
Ian Dobson
$L_p$-stabilization of integrator chains subject to input saturation using Lyapunov-based homogeneous design
Yacine Chitour
,
Mohamed Harmouche
,
Salah Laghrouche
Optimization of Hybrid PV/Wind Power System for Remote Telecom Station
Subodh Paudel
,
Jagan Nath Shrestha
,
Fernando J Neto
,
Jorge AF Ferreira
,
Muna Adhikari
Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework
Andrew Clark
,
Basel Alomair
,
Linda Bushnell
,
Radha Poovendran
Containment Control of Multi-Agent Systems with Dynamic Leaders Based on a $PI^n$-Type Approach
Yunpeng Wang
,
Long Cheng
,
Wei Ren
,
Zeng-Guang Hou
,
Min Tan
Optimal Reduction of Multivariate Dirac Mixture Densities
Uwe D. Hanebeck
A Supervisory Control Approach to Dynamic Cyber-Security
Mohammad Rasouli
,
Erik Miehling
,
Demosthenis Teneketzis
A New Algorithm for Solving Ring-LPN with a Reducible Polynomial
Qian Guo
,
Thomas Johansson
,
Carl L?ndahl
State of Charge Evolution Equations for Flywheels
D. Fooladivanda
,
G. Mancini
,
S. Garg
,
C. Rosenberg
Secure Cloud Computing through Homomorphic Encryption
Maha Tebaa
,
Said El Hajji
Multi-UAV-based Optimal Crop-dusting of Anomalously Diffusing Infestation of Crops
Jianxiong Cao
,
YangQuan Chen
,
Changpin Li
Using Architecture to Reason about Information Security
Stephen Chong
,
Ron van der Meyden
Balanced permutations Even-Mansour ciphers
Shoni Gilboa
,
Shay Gueron
,
Mridul Nandi
Indonesian's presidential social media campaigns
Leon Andretti Abdillah
Cycle slipping in nonlinear circuits under periodic nonlinearities and time delays
Vera Smirnova
,
Anton Proskurnikov
,
Natalia V. Utina
Semi-active Suspension Control using Modern Methodology: Comprehensive Comparison Study
Omid Ghasemalizadeh
,
Saied Taheri
,
Amandeep Singh
,
Jill Goryca
Modeling Populations of Thermostatic Loads with Switching Rate Actuation
Luminita Cristiana Totu
,
Rafael Wisniewski
,
John Leth
Approximating Matrices with Multiple Symmetries
Charles Van Loan
,
Joseph Vokt
The Approximate Bilinear Algorithm of Length 46 for Multiplication of 4 x 4 Matrices
A. V. Smirnov
On Higher-order Singular Value Decomposition from Incomplete Data
Yangyang Xu
A Field Guide to Forward-Backward Splitting with a FASTA Implementation
Tom Goldstein
,
Christoph Studer
,
Richard Baraniuk
An Implementation Framework (IF) for the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan
Ahmed Otoom
,
Issa Atoum
A Security Architecture for Mobile Wireless Sensor Networks
Stefan Schmidt
,
Holger Krahn
,
Stefan Fischer
,
Dietmar W?tjen
Identifying Talented Software Engineering Students through Data-driven Skill Assessment
Jun Lin
,
Han Yu
,
Zhiqi Shen
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
Refinement of Pipe-and-Filter Architectures
Jan Philipps
,
Bernhard Rumpe
A Guide To Deal With Uncertainties In Software Project Management
M. L. M. Marinho
,
S. C. B. Sampaio
,
T. L. A. Lima
,
H. P. Moura
State of the Art of Agile Governance: A Systematic Review
Alexandre J. H. de O. Luna
,
Philippe Kruchten
,
Marcello L. G. do E. Pedrosa
,
Humberto R. de Almeida Neto
,
Hermano P. de Moura
Systematic Review on Project Actuality
S. C. B. Sampaio
,
M. L. M. Marinho
,
H. P. Moura
Stagnation of block GMRES and its relationship to block FOM
Kirk M. Soodhalter
A Note on Quantum Security for Post-Quantum Cryptography
Fang Song
Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk
Mousa Alfalayleh
,
Ljiljana Brankovic
A Two Stage CVT / Eikonal Convection Mesh Deformation Approach for Large Nodal Deformations
Stephan Schmidt
A multigrid solver for the three dimensional Monge-Ampère equation
Jun Liu
,
Brittany D. Froese
,
Adam M. Oberman
,
Mingqing Xiao
Multilayer stochastic block models reveal the multilayer structure of complex networks
Toni Valles-Catala
,
Francesco A. Massucci
,
Roger Guimera
,
Marta Sales-Pardo
A Self-Tester for Linear Functions over the Integers with an Elementary Proof of Correctness
Sheela Devadas
,
Ronitt Rubinfeld
On families of anticommuting matrices
Pavel Hrube?
Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources
Salman Beigi
,
Omid Etesami
,
Amin Gohari
Classical and quantum counter automata on promise problems
Masaki Nakanishi
,
Abuzer Yakary?lmaz
Path Relinking for Bandwidth Coloring Problem
Xiangjing Lai
,
Zhipeng Lu
,
Jin-Kao Hao
,
Fred Glover
,
Liping Xu
The simplified weighted sum function and its average sensitivity
Jiyou Li
,
Chu Luo
Generation and Analysis of Constrained Random Sampling Patterns
Jacek Pierzchlewski
,
Thomas Arildsen
The space "just above" BQP
Scott Aaronson
,
Adam Bouland
,
Joseph Fitzsimons
,
Mitchell Lee
Cooperative Equilibrium: A solution predicting cooperative play
Nan Rong
,
Joseph Y. Halpern
Secondary Spectrum Auctions for Markets with Communication Constraints
Deepan Palguna
,
David J. Love
,
Ilya Pollak
Defeating jamming with the power of silence: a game-theoretic analysis
Salvatore D'Oro
,
Laura Galluccio
,
Giacomo Morabito
,
Sergio Palazzo
,
Lin Chen
,
Fabio Martignon
Sharing Non-Anonymous Costs of Multiple Resources Optimally
Max Klimm
,
Daniel Schmand
Go