首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
On The Modeling of OpenFlow-based SDNs: The Single Node Case
Kashif Mahmood
,
Ameen Chilwan
,
Olav N. ?sterb?
,
Michael Jarschel
Observationally-induced algebras in Domain Theory
Thomas Streicher
,
K. Keimel
,
T. Streicher
$μ$-diff: an open-source Matlab toolbox for computing multiple scattering problems by disks
Bertrand Thierry
,
Xavier Antoine
,
Chokri Chniti
,
Hasan Alzubaidi
Minimum Energy Routing in Wireless Networks in the Presence of Jamming
Azadeh Sheikholeslami
,
Majid Ghaderi
,
Hossein Pishro-Nik
,
Dennis Goeckel
TCP Congestion Control Identification
Mohammed Ahmed
Proceedings Fifth International Workshop on Classical Logic and Computation
Paulo Oliva
A simple proof of the completeness of APAL
Philippe Balbiani
,
Hans van Ditmarsch
A Primer on IPv4 Scarcity
Philipp Richter
,
Mark Allman
,
Randy Bush
,
Vern Paxson
Opportunistic Multicast Scheduling for Unicast Transmission in MIMO-OFDM System
Peng Hui Tan
,
Jingon Joung
,
Sumei Sun
A Statistical Analysis of Multipath Interference for Impulse Radio UWB Systems
Mihai I. Stanciu
,
Stéphane Azou
,
Emanuel R?doi
,
Alexandru ?erb?nescu
Large-scale Spatial Distribution Identification of Base Stations in Cellular Networks
Yifan Zhou
,
Zhifeng Zhao
,
Qianlan Ying
,
Rongpeng Li
,
Xuan Zhou
,
Xianfu Chen
,
Honggang Zhang
Qualitative Analysis of POMDPs with Temporal Logic Specifications for Robotics Applications
Krishnendu Chatterjee
,
Martin Chmelík
,
Raghav Gupta
,
Ayush Kanodia
Generating S-Boxes from Semi-fields Pseudo-extensions
Jean-Guillaume Dumas
,
Jean-Baptiste Orfila
Some Notes on Constructions of Binary Sequences with Optimal Autocorrelation
Tongjiang Yan
,
Guang Gong
A Discrete Logarithm-based Approach to Compute Low-Weight Multiples of Binary Polynomials
P. Peterlongo
,
M. Sala
,
C. Tinnirello
Rabin-$p$ Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme
Muhammad Asyraf Asbullah
,
Muhammad Rezal Kamel Ariffin
Secret Key Agreement: General Capacity and Second-Order Asymptotics
Masahito Hayashi
,
Himanshu Tyagi
,
Shun Watanabe
The Decrits Consensus Algorithm: Decentralized Agreement without Proof of Work
Ryan Pfeiffer
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
Laszlo B. Kish
,
Zoltan Gingl
,
Robert Mingesz
,
Gergely Vadai
,
Janusz Smulko
,
Claes-Goran Granqvist
Deciding what to display: maximizing the information value of social media
Sandra Servia-Rodríguez
,
Bernardo A. Huberman
,
Sitaram Asur
Constructing Strategy of Online Learning in Higher Education: Transaction Cost Economy
Yabit Alas
,
Muhammad Anshari
Mining cross-cultural relations from Wikipedia - A study of 31 European food cultures
Paul Laufer
,
Claudia Wagner
,
Fabian Fl?ck
,
Markus Strohmaier
Estimating Food Consumption and Poverty Indices with Mobile Phone Data
Adeline Decuyper
,
Alex Rutherford
,
Amit Wadhwa
,
Jean-Martin Bauer
,
Gautier Krings
,
Thoralf Gutierrez
,
Vincent D. Blondel
,
Miguel A. Luengo-Oroz
Flooding through the lens of mobile phone activity
David Pastor-Escuredo
,
Alfredo Morales-Guzmán
,
Yolanda Torres-Fernández
,
Jean-Martin Bauer
,
Amit Wadhwa
,
Carlos Castro-Correa
,
Liudmyla Romanoff
,
Jong Gun Lee
,
Alex Rutherford
,
Vanessa Frias-Martinez
,
Nuria Oliver
,
Enrique Frias-Martinez
,
Miguel Luengo-Oroz
The Digital Humanities Unveiled: Perceptions Held by Art Historians and Computer Scientists about Computer Vision Technology
Emily L. Spratt
,
Ahmed Elgammal
Cognitive image processing: the time is right to recognize that the world does not rest more on turtles and elephants
Emanuel Diamant
Age of Big Data and Smart Cities: Privacy Trade-Off
Kaoutar Ben Ahmed
,
Mohammed Bouhorma
,
Mohamed Ben Ahmed
Censorship is Futile
Zubair Nabi
Storms in Mobile Networks
Gokce Gorbil
,
Omer H. Abdelrahman
,
Mihajlo Pavloski
,
Erol Gelenbe
Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms
Marcos Portnoi
,
Chien-Chung Shen
A Provenance-Policy Based Access Control Model For Data Usage Validation In Cloud
Muralikrishnan Ramane
,
Balaji Vasudevan
,
Sathappan Allaphan
Unshared Secret Key Cryptography: Finite Constellation Inputs and Ideal Secrecy Outage
Shuiyin Liu
,
Yi Hong
,
Emanuele Viterbo
Complexity of distance fraud attacks in graph-based distance bounding
Rolando Trujillo-Rasua
A quantum approach to homomorphic encryption
Si-Hui Tan
,
Joshua A. Kettlewell
,
Yingkai Ouyang
,
Lin Chen
,
Joseph F. Fitzsimons
Security in Monitoring Schemes: A Survey
Atul Vaibhav
Anonymously Analyzing Clinical Datasets
Nafees Qamar
,
Yilong Yang
,
Andras Nadas
,
Zhiming Liu
,
Janos Sztipanovits
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images
Leo Yu Zhang
,
Kwok-Wo Wong
,
Yushu Zhang
,
Qiuzhen Lin
Identifying Cheating Anchor Nodes using Maximum Likelihood and Mahalanobis Distance
Jeril Kuriakose
,
V. Amruth
,
Swathy Nandhini
,
V. Abhilash
A bias-free quantum random number generation using photon arrival time selectively
Jian-min Wang
,
Tian-yu Xie
,
Hong-fei Zhang
,
Dong-xu Yang
,
Chao Xie
,
Jian Wang
Simulation of Collision Resistant Secure Sum Protocol
Samiksha Shukla
,
G. Sadashivappa
,
Durgesh Kumar Mishra
Warp2: A Method of Email and Messaging with Encrypted Addressing and Headers
H. Bjorgvinsdottir
,
P. M. Bentley
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
Debajyoti Mukhopadhyay
,
Ashay Shirwadkar
,
Pratik Gaikar
,
Tanmay Agrawal
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web
Daniel Fett
,
Ralf Küsters
,
Guido Schmitz
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program
Amal Saha
,
Sugata Sanyal
Cross Site Request Forgery on Android WebView
A B Bhavani
A Formal Approach to Distributed System Security Test Generation
Vladimir A. Khlevnoy
,
Andrey A. Shchurov
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
Alina Oprea
,
Zhou Li
,
Ting-Fang Yen
,
Sang Chin
,
Sumayah Alrwais
CBM: A Crypto-Coded Modulation Scheme for Rate Information Concealing and Robustness Boosting
Triet D. Vo-Huu
,
Guevara Noubir
On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?
Peter T. Breuer
,
Jonathan P. Bowen
Privacy-Preserving Content-Based Image Retrieval in the Cloud
Bernardo Ferreira
,
Jo?o Rodrigues
,
Jo?o Leit?o
,
Henrique Domingos
Go