首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Budget-restricted utility games with ordered strategic decisions
Maximilian Drees
,
S?ren Riechers
,
Alexander Skopalik
Fast cooling for a system of stochastic oscillators
Yongxin Chen
,
Tryphon Georgiou
,
Michele Pavon
Output Feedback Stabilization of Switched Linear Systems with Limited Information
Masashi Wakaiki
,
Yutaka Yamamoto
Learning Valuation Distributions from Partial Observation
Avrim Blum
,
Yishay Mansour
,
Jamie Morgenstern
Low-Order Mathematical Modelling of Electric Double Layer Supercapacitors Using Spectral Methods
Ross Drummond
,
David A. Howey
,
Stephen R. Duncan
Open-coopetition in the PC and mobile industries: the WebKit case
Jose Teixeira
Probabilistic Modeling and Simulation of Transmission Line Temperatures under Fluctuating Power Flows
Markus Schl?pfer
,
Pierluigi Mancarella
Analysis of factors that affect the students academic performance - Data Mining Approach
Nahid Hajizadeh
,
Marzieh Ahmadzadeh
Estimation of transient process for singularly perturbed synchronization system with distributed parameters
Vera Smirnova
,
Anton V. Proskurnikov
,
Natalia V. Utina
GUI system for Elders/Patients in Intensive Care
J. L. Raheja
,
Dhiraj
,
D. Gopinath
,
Ankit Chaudhary
A Body Area Network through Wireless Technology
Ramesh. GP
,
Aravind. CV
,
Rajparthiban. R
,
N. Soysa
A new structure exploiting derivation of recursive direct weight optimization
Liang Dai
,
Thomas B. Sch?n
On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator
Xavier Vilaca
,
Luis Rodrigues
Building-in-Briefcase (BiB)
Kevin Weekly
,
Ming Jin
,
Han Zou
,
Christopher Hsu
,
Alexandre Bayen
,
Costas Spanos
Visualizing and Quantifying Impact and Effect in Twitter Narrative using Geometric Data Analysis
Fionn Murtagh
,
Monica Pianosi
,
Richard Bull
On the Complexity of Dynamic Mechanism Design
Christos Papadimitriou
,
George Pierrakos
,
Christos-Alexandros Psomas
,
Aviad Rubinstein
Modelling Electrical Car Diffusion Based on Agents
Lei Yu
,
Tao Zhang
,
Peer-Olaf Siebers
,
Uwe Aickelin
Benchmarking the Privacy-Preserving People Search
Shuguang Han
,
Daqing He
,
Zhen Yue
Social determinants of content selection in the age of (mis)information
Alessandro Bessi
,
Guido Caldarelli
,
Michela Del Vicario
,
Antonio Scala
,
Walter Quattrociocchi
Quantum signaling game
Piotr Frackiewicz
The Crypto-democracy and the Trustworthy
Sebastien Gambs
,
Samuel Ranellucci
,
and Alain Tapp
Mining Users' Significant Driving Routes with Low-power Sensors
Sarfraz Nawaz
,
Cecilia Mascolo
Synergy cycles in the Norwegian innovation system: The relation between synergy and cycle values
Inga Ivanova
,
Oivind Strand
,
Loet Leydesdorff
Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB
Hayder Raheem Hashim
,
Irtifaa Abdalkadum Neamaa
Key Capacity for Product Sources with Application to Stationary Gaussian Processes
Jingbo Liu
,
Paul Cuff
,
Sergio Verdú
On Modeling the Costs of Censorship
Michael Carl Tschantz
,
Sadia Afroz
,
Vern Paxson
,
J. D. Tygar
Tackling the "Gremlins Paradox" : Autonomous Hot Swap Healing Protocol for Chronic Performance Problem Aversion in On-board Mission Critical Systems for Lethal Autonomous Weapons
Nyagudi Musandu Nyagudi
CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph
Pengtao Xie
,
Eric Xing
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
Emiliano De Cristofaro
,
Arik Friedman
,
Guillaume Jourjon
,
Mohamed Ali Kaafar
,
M. Zubair Shafiq
A String-Based Public Key Cryptosystem
M. Andrecut
Field and long-term demonstration of a wide area quantum key distribution network
Shuang Wang
,
Wei Chen
,
Zhen-Qiang Yin
,
Hong-Wei Li
,
De-Yong He
,
Yu-Hu Li
,
Zheng Zhou
,
Xiao-Tian Song
,
Fang-Yi Li
,
Dong Wang
,
Hua Chen
,
Yun-Guang Han
,
Jing-Zheng Huang
,
Jun-Fu Guo
,
Peng-Lei Hao
,
Mo Li
,
Chun-Mei Zhang
,
Dong Liu
,
Wen-Ye Liang
,
Chun-Hua Miao
,
Ping Wu
,
Guang-Can Guo
,
Zheng-Fu Han
Citizen Electronic Identities using TPM 2.0
Thomas Nyman
,
Jan-Erik Ekberg
,
N. Asokan
Opening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: An operational risk perspective
Gareth W. Peters
,
Ariane Chapelle
,
Efstathios Panayi
Are you going to the party: depends, who else is coming? [Learning hidden group dynamics via conditional latent tree models]
Forough Arabshahi
,
Furong Huang
,
Animashree Anandkumar
,
Carter T. Butts
,
Sean M. Fitshugh
On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel
Wenwen Tu
,
Lifeng Lai
Quantum Secret Sharing with error correction
Aziz Mouzali
,
Fatiha Merazka
,
Damian Markham
RoBuSt: A Crash-Failure-Resistant Distributed Storage System
Martina Eikel
,
Christian Scheideler
,
Alexander Setzer
Exact and approximate algorithms for movement problems on (special classes of) graphs
Davide Bilò Luciano Gualà
,
Stefano Leucci
,
Guido Proietti
Longest common substrings with k mismatches
Tomas Flouri
,
Emanuele Giaquinta
,
Kassian Kobert
,
Esko Ukkonen
Maximizing k-Submodular Functions and Beyond
Justin Ward
,
Stanislav Zivny
On the Average-case Complexity of Pattern Matching with Wildcards
Carl Barton
,
Costas S. Iliopoulos
A quantum algorithm for approximating the influences of Boolean functions and its applications
Hong-Wei Li
,
Li Yang
About accuracy of the solution of NP-complete tasks
Rustem Valeyev
Streaming Lower Bounds for Approximating MAX-CUT
Michael Kapralov
,
Sanjeev Khanna
,
Madhu Sudan
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
Reginald D. Smith
Gaussian elimination in unitary groups with an application to cryptography
Ayan Mahalanobis
,
Anupam Singh
IP Tracing and Active Network Response
Tarek S. Sobh
,
Awad H. Khalil
Detecting Behavioral and Structural Anomalies in MediaCloud Applications
Guido Schwenk
,
Sebastian Bach
Similarity-based matching meets Malware Diversity
Mathias Payer
,
Stephen Crane
,
Per Larsen
,
Stefan Brunthaler
,
Richard Wartell
,
Michael Franz
Privacy by Design: From Technologies to Architectures (Position Paper)
Thibaud Antignac
,
Daniel Le Métayer
Go